File

advertisement
Salman bin Abdul-Aziz University
College Of Business Administration
DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS
MIS 430 – Information Security
Assignment 4
Student Name
Student Number
Due Date
11th May,2013 (Saturday)
Signature
General Instructions

The assignment should clearly mention the student name and student number.

Please read all the questions carefully.

Answer all the questions.

Late submissions will be penalized 10 points per day.
1 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS
Salman bin Abdul-Aziz University
College Of Business Administration
DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS
1.
_____________________ is a method of packaging packets so that they can travel a network in a
secure and confidential manner.
2.
The _____________________ acts like a buffer zone between the Internet (un-trusted zone) and
internal network (trusted zone).
3.
_____________________ involves using a laptop and software to find wireless networks from outside
the premises.
4.
The ability to observe the network traffic; username, password and data is called as
_____________________.
5.
_____________________ is commonly used in remote control devices, wireless devices like printers,
keyboards, mice and PDA’s.
6.
_____________________ is used to describe a specific portion of the RF spectrum that is used for
communication as well as other tasks such as cooking.
7.
_____________________ is the most common and widely used method of wireless communication.
8.
_____________________ cable uses a beam of laser light to connect devices over a thin glass wire.
9.
The biggest advantage of fiber optic cables is the higher bandwidth.
a. True
b. False
10. The biggest disadvantage of fiber optic cables is the cost.
a. True
b. False
11. _____________________ cables are very common in connecting TV’s to cable services or satellite.
12. Media operates at the _____________________ layer of the OSI model.
13. _____________________ are set up in a shared arrangement; this allows the neighbor to sniff the
network traffic.
14. Installing a firewall is the best security measure to secure a cable/DSL.
a. True
b. False
2 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS
Salman bin Abdul-Aziz University
College Of Business Administration
DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS
15. A _____________________ modem provides a direct digital connection between a subscribers
computer and an Internet connection at the local telephone company’s switching station.
16. A _____________________ is a node on a network that serves as an entrance to another network.
17. Gateway works at all the 7 layers of OSI model.
a. True
b. False
18. Routers operate at _____________________ layer.
19. A _____________________ is software or a hardware device that connects two LAN’s or two
segments of the same LAN.
20. Bridge is a layer _____________________ device.
21. Switch operates at the _____________________ layer (DLL) of OSI model.
22. Switch is an active device
a. True
b. False
23. Hub is a passive device
a. True
b. False
24. Hub operates at _____________________ layer of OSI model.
25. A _____________________ is a simple hardware device that receives a weak signal and regenerates
it.
26. Repeaters are used at _____________________ layer of the OSI Model.
27. _____________________ is the science of keeping information secure in terms of confidentiality and
integrity.
28. The process used to encrypt the plaintext or decrypt the cipher-text is referred to as
_____________________.
29. The _____________________ involves shifting each letter of the plaintext message by a certain
number of letters.
30. “University” can be transformed to _____________ by forward shifting 3 bits.
3 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS
Salman bin Abdul-Aziz University
College Of Business Administration
DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS
31. Symmetric algorithms use only one key.
a. True
b. False
32. Asymmetric algorithms use multiple keys.
a. True
b. False
33. A _____________________ cipher takes a predetermined number of bits, known as block, in the
plaintext message and encrypts that block.
34. A _____________________ cipher encrypts each bit in the plaintext message, 1 bit at a time.
35. Hash functions perform one-way encryption.
a. True
b. False
36. Hashing algorithm is a keyless algorithm.
a. True
b. False
37. _____________________ allow us to sign a message in order to enable detection of changes to the
message contents.
38. A _____________________ is a special mathematical function that performs one-way encryption.
39. The hashing algorithm can be attacked with what is called _____________________.
40. Write short notes on SHA. (10 Points)
41. Write short notes on DES and AES. (10 Points)
42. Write short notes on MD2, MD 4 and MD5. (10 Points)
43. What are the common threats for a workstation? (10 Points)
44. Write short notes on Intrusion Detection Systems. Explain the Host Based IDS and Network based
IDS. (10 points)
45. Write the two common ways to prevent the loss of data from removal media. (2 Points)
46. Write the two drawbacks of Infrared (IR). (2 points)
47. Write the advantage of Microwave. (4 points)
48. Explain the two types of bridges. (3 Points)
4 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS
Salman bin Abdul-Aziz University
College Of Business Administration
DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS
5 DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS
Download