Sunteți pe pagina 1din 3

ID NUMBER: ...................................

Name:.................................................

Computer and Network Security


Faculty of Education, Science, Technology and Mathematics
Pattern of Final Exam
Semester 2, 2016

Unit Name: Computer and Network Security


Time Allowed: 2 Hours
Permitted Material: Calculator
Total Points: 100
Examiner: Munawar Hayat
Contact Details: 02 6210 2920
Email: munawar.hayat@canberra.edu.au

Instructions:
1. The final exam is currently scheduled for Wednesday 16 November at 9am in Building 4 (GYM). This
might change. Please check your final timetable.
2. The exam will have two parts. Part-1 will have 60 MCQs (one point each), while Part-2 will have short
descriptive questions (40 points total). Part 2 will also include short numerical calculations. Youre
allowed a scientific calculator.
3. You will have to attempt all questions in the exam.
4. Sample questions in the exam are given below.

Part-1: MCQs: Page 1 of 3

Part-1: MCQs
1. 1 point Verifying that users are who they say they are and that each input arriving at the system came
from a trusted source is
.
A. authenticity
B. credibility
C. accountability
D. integrity
2. 1 point A
of the ciphertext is obtained.

attack involves trying every possible key until an intelligible translation

A. brute-force
B. Caesar attack
C. ciphertext only
D. chosen plaintext
3. 1 point If both parties use only one key over a secure encrypted channel, such a system is referred to
as:
A. public-key encryption
B. two-key
C. asymmetric
D. symmetric encryption
4. 1 point Conidering all other parameters equal, larger block sizes mean greater security for block ciphers.
A. True
B. False
5. 1 point A digital signature can guarantee the source but not the integrity of the message.
A. True
B. False
6. 1 point X.509 defines the format for public-key certificates.
A. True
B. False
7. 1 point Frequent communication between end systems is encrypted using a

key.

A. session
B. master
C. permanent
D. message
8. 1 point A
firewall applies a set of rules to each incoming and outgoing IP packet
and then forwards or discards the packet.
A. host-based
B. packet filtering

Part-1: MCQs: Page 2 of 3

C. distributed
D. stateful inspection

Part-2: Descriptive Questions


For Part 2, You will be asked short descriptive questions. For some numerical problems, you are expected
to know steps involved in different public key algorithms such as RSA. Sample questions can be:
9. Consider the following parameters for RSA.
p=3
q = 17
e=3
For message M = 5, encrypt it using public key e and compute the value of the cipher-text C using
RSA.


10 3
10. Calculate the determinant mod 26 of
.
5 6
11. Consider the following alphabet to numeric mapping
a
0

b
1

c
2

d
3

e
4

f
5

g
6

.
.

.
.

z
25

A plaintext p=bad is encrypted using a simple substitution cipher. The key used for encryption is
cba. Determine the resulting ciphertext?
12. In order to use public key croptography for digital signatures, of the two keys (public and private), which
key is used for encryption and which key is used for decryption?

Part-1: MCQs: Page 3 of 3

S-ar putea să vă placă și