MIS1040 2013 Paper
MIS1040 2013 Paper
Important Instructions:
PKI-1 PKI-2
CA-S1
CA-T1
CA-S2
CA-T2
Public Key
Certificate
CA-T3 User A User B
(b). What is the purpose of an Online Certificate Status (OCSP) protocol with respect to
public key management?
[5 marks]
(c). Briefly explain the authentication process of Transport Layer Security (TLS) protocol.
[7 marks]
(d). What are the files that will be created as the result of the following OpenSSL
command?
openssl req -new -x509 -out host.pem
[6 marks]
Page 2
2.
(a). Using a suitable example, briefly explain the difference between a Hash Message
Authentication Code (HMAC) and a Hash code with respect to data integrity and data
authentication.
[5 marks]
(b). List three (3) basic security services provided by Pretty Good Privacy (PGP) e-mail
standard.
[3 marks]
(c). “An email can be considered as a postcard written using a pencil”. Do you agree with
this statement? State reasons.
[4 marks]
(d). A service protected by Kerberos obtains a Kerberos "ticket" before using that service.
(i). What is the role of the Ticket Granting Service (TGS) ticket?
(ii). Symmetric keys are used in Kerberos. Write down three (3) such keys used in
Kerberos.
(iii). Larger networks are divided into realms. State reasons for doing so.
[9 marks]
(e). What is the difference between the “Transport” mode and “Tunnel” mode in IPsec
protocol?
[4 marks]
3.
(a). Describe the term “Intrusion” with three real world examples.
[4 marks]
(b). Intrusion detection systems use several types of intrusion detection techniques to
detect malicious traffic transferring over the wire. Briefly explain two (2) of those
techniques and their advantages and disadvantages.
[6 marks]
(c). Briefly explain the advantages of Binary Logging over Plain Text Logging.
[3 marks]
(d). Security Incident and Event Management System (SIEM) is a technology that
aggregates the event data produced by security devices, network devices and system
applications etc. over a network. Discuss the key requirements that need to be
considered when you are evaluating such a solution?
[6 marks]
(e). It is important to remember that an IDS is only one of many tools in the security
professional’s arsenal against attacks and intrusions. As with any tool, all IDS have
their own limitations and challenges. Discuss three (3) limitations that IDS tools
encounter when analyzing intrusion patterns.
[6 marks]
Page 3
4.
(a). Describe what is meant by each of the following terms in the context of a security
solution for a network.
• Threat
• Vulnerability
• Risk
[3 marks]
(d). Imagine that you are a systems security specialist, hired to conduct a vulnerability
assessment in an organization called “TecDefence”. Describe how you are going to
apply a vulnerability assessment methodology to successfully complete this
assignment.
[10 marks]
(e). Discuss a technique that is available to defend against layer 2 attacks such as “ARP
Poisoning”?
[3 marks]
********
Page 4