Networks Security Final Exam - April 2024
Networks Security Final Exam - April 2024
Question 1:
a) Briefly describe the processes of encryption and decryption in relation to
cryptography.
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………….
b) What is the difference between Symmetric and Asymmetric key encryption?
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
………………………………………………………………………………………………….
c) Suppose you decide to use a 10-bit key. How many combinations are there?
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………
--*1*--
*##############################################################################################################*
Question 2:
a) James and Alexander are having a debate about Public Key Infrastructure (PKI).
James says that it is simply a way of authenticating users. However, Alexander
argues that it is a type of encryption algorithm. They have asked you to decide who
is correct.
Briefly outline the purpose of PKI. You should also explain what is meant by a
certificate authority and digital certificate.
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
……….
b) Are James’s and Alexander’s opinions about Public Key Infrastructure correct or
incorrect? For each opinion, you should provide ONE (1) reason for why it is either
correct or incorrect.
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………….
c) Briefly explain what is meant by a password audit.
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
……………………….…………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
--*2*--
*##############################################################################################################*
Question 3:
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
………………….
b) Briefly explain what is by an Authentication Header (AH) and an
EncapsulatingSecurity Payload (ESP).
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
c) Draw a diagram to show where IPSec fits in the TCP/IP model.
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
--*3*--
*##############################################################################################################*
Question 4:
--*4*--
*##############################################################################################################*
Question 5:
--*5*--
*##############################################################################################################*
Question 6: