5-Security Assessment and Testing Candidate Tool
5-Security Assessment and Testing Candidate Tool
061205T4CYB
CYBER SECURITY LEVEL 5
SEC/OS/CS/CR/07/5/A
CONDUCT CYBER SECURITY ASSESSMENT AND TESTING
Nov. / Dec. 2023
WRITTEN ASSESSMENT
Time: 3 Hours
INSTRUCTIONS TO CANDIDATES
Maximum marks for each question are indicated in brackets ().
This paper consists of THREE sections: A, B and C.
Answer questions as per instructions in each section.
You are provided with a separate answer booklet.
Answer the questions in English
Page 1 of 7
©2023 TVET CDACC
Page 2 of 7
©2023 TVET CDACC
Page 3 of 7
©2023 TVET CDACC
11. During the initial stages of a cyber-security assessment, which of the following activities
typically falls under information gathering and reconnaissance?
A. Installing intrusion detection systems (IDS).
B. Scanning for vulnerabilities.
C. Conducting social engineering attacks.
D. Collecting publicly available data about the target
12. Why is it essential for an organization to align its operation platform with industry-specific
standards and best practices?
A. To cater to the personal preferences of top management.
B. To save money on operational expenses.
C. To enhance efficiency, compliance, and competitiveness.
D. To prioritize employee leisure activities.
13. Which of the following is a crucial element in user identification and authentication?
A. The user's favorite color.
B. A strong and unique password.
C. The user's email address.
D. The user's physical location.
14. Which of the following is NOT a typical source of information during reconnaissance for a
cybersecurity assessment?
A. Social media profiles.
B. Network traffic logs.
C. Domain registration data.
D. Network scans.
15. During the initial stages of a cyber-security assessment, which of the following activities
typically falls under information gathering and reconnaissance?
A. Installing intrusion detection systems (IDS).
B. Scanning for vulnerabilities.
C. Conducting social engineering attacks.
D. Collecting publicly available data about the target.
Page 4 of 7
©2023 TVET CDACC
Page 5 of 7
©2023 TVET CDACC
Page 6 of 7
©2023 TVET CDACC
Section C :( 40 MARKS)
31. Smart Firm company is in the process of establishing a local area network to facilitate sharing
of resources such information and printers. The company has office set up consisting of three
computers (Comp A, Comp B, and Comp C) connected to a central switch (Switch D). The
switch is then connected to a router (Router E) for internet connectivity.
a) As a network expert, draw a network topology diagram for the company using relevant
symbols. Ensure that the diagram clearly represents the network connections and the
flow of data within the network.
(6marks)
b) Identify FOUR scanning techniques you would utilize during the network scan
(4marks)
c) Discuss FOUR network management best practices you should follow to ensure
efficient operations.
(10marks)
32. Top mark is a manufacturing company that produces drinks of different flavors. To reach their
customer, it has established a website and social media accounts. The company handle
sensitive information about the customers. As a cyber-security expert, you have been
contracted to assess the cyber security status of the company.
a) Describe FIVE possible sources of information that you can use to collect information
about Company and its systems.
(10marks)
b) Discuss FIVE techniques that you could utilize to gather information about Top mark
Company (10marks)
33. As the cyber security technician of Top mark company, one of your responsibilities is testing
and exploiting known vulnerabilities within the company's systems.
a) Describe FIVE vulnerabilities you could exploit. (10marks)
b) After testing and exploiting know vulnerabilities, you are supposed to generate an
exploitation proof of concept (PoC). Discuss FIVE benefits of generating PoC in line with
the standard operating procedures. (10marks)
Page 7 of 7