0% found this document useful (0 votes)
103 views1 page

CIT855

Readable

Uploaded by

donmaximum55
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views1 page

CIT855

Readable

Uploaded by

donmaximum55
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

NATIONAL OPEN UNIVERSITY OF NIGERIA

Plot 91, Cadastral Zone, Nnamdi Azikiwe Expressway, Jabi, Abuja


Faculty of Science
2023_2 EXAMINATIONS 2023SEM2

POSTGRADUATE: PDG
COURSE TITLE: ADVANCED CYBER SECURITY
COURSE CODE CIT855
CREDIT UNIT(S): 2
TIME ALLOWED: 2 Hours
INSTRUCTION: Answer question ONE and any other two questions

QUESTION ONE
A. Define point of sale theft and enumerate any three (3) cyber security goal? (5 marks)
B. How does Man-in-the-Middle (MITM) attack works? (6 marks)
C. Explain any four (4) top security threat in the world (8 marks)
D. Explain what you understand by Information Technology Act (ITA-2000) and not more
than four (4) points, enumerate some of the objectives of the Information Technology
Act, 2000? (11 marks)
QUESTION TWO
A. List out any two (2) tools attached to each of the CIA triad (6 marks)
B. List any four (4) reasons for backing up of data on a daily basis? (6 marks)
C. In a tabular form; not more than four (4) points explain the relationship between IoT and
(8 marks)
QUESTION THREE
A. What is a non-physical threat in cyber security and how can fraud be prevented? (4
marks)
B. Discuss briefly Internet of Things and block chain (IoT) as recent cybersecurity
challenges? (6 marks)
C. List and explain four (4) types of block chaining (10 marks)

QUESTION FOUR
A. Discuss the various cyber security detection and prevention mechanisms. (4 marks)
B. Differentiate between vulnerability assessment and penetration testing and list any four
(4) importance of penetration testing in an enterprise. (8 marks)
C. Define cyber security threats in e-commerce; list and explain briefly the six (6)
dimensions of E-commerce security (8 marks)

QUESTION FIVE
A. State any four (4) benefits of cyber security? (4 marks)
B. State and explain any five (5) of the security principles (10 marks)
C. What is the function of (WPA) - WIFI Protected Access (WPA) and Wired Equivalent
Privacy (WEP) (6 marks)

You might also like