0% found this document useful (0 votes)
10 views2 pages

Network Security

The document outlines an examination for the Network Security course at the Institut Universitaire Siantou, detailing the structure of the exam which includes multiple choice questions, structured questions, and scenario-based questions. It covers key concepts in network security such as confidentiality, integrity, and availability, as well as various types of network attacks and countermeasures. The exam is designed for HND1 students in the Engineering department and is supervised by Engr. Kimbi Eric.

Uploaded by

dongmoyann28
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views2 pages

Network Security

The document outlines an examination for the Network Security course at the Institut Universitaire Siantou, detailing the structure of the exam which includes multiple choice questions, structured questions, and scenario-based questions. It covers key concepts in network security such as confidentiality, integrity, and availability, as well as various types of network attacks and countermeasures. The exam is designed for HND1 students in the Engineering department and is supervised by Engr. Kimbi Eric.

Uploaded by

dongmoyann28
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

MINISTERE DE L’ENSEIGNEMENT SUPERIEUR REPUBLIQUE DU CAMEROUN

Paix-Travail-Patrie
INSTITUT UNIVERSITAIRE SIANTOU
ECOLE SUPERIEURE DES TECHNOLOGIES ET INDUSTRIES SIANTOU
ECOLE SUPERIEURE DE MANAGEMENT, DE GESTION ET DE COMMUNICATION SIANTOU
ECOLE SUPERIEURE DES SCIENCES DE LA SANTE SIANTOU
Discipline Travail Efficacité BTS DSEP HND LICENCES PROFESSIONNELLES BACHELOR MASTERS
CAPACITE EN DROIT FORMATION PROFESSIONNELLE
L’Ecole des Majors

Année académique : 20…24…/20…25….. Examen : 2e Semestre


Session : Normale Cycle :HND1
Département : Engineering Spécialité(s) : nws1
Durée : 2hrs Examinateur : Engr. Kimbi Eric

EPREUVE DE :NETWORK SECURITY

Section A: Multiple Choice Questions (1 mark each)

Choose the correct option.

1. Which of the following best defines network security?


A. Using antivirus software only
B. Preventing unauthorized access and misuse of computer networks
C. Disabling firewalls
D. Hiding IP addresses
2. What is the main goal of confidentiality in network security?
A. Preventing loss of data
B. Protecting data from unauthorized access
C. Monitoring network traffic
D. Backup data regularly
3. Which of the following is a form of malware?
A. Switch B. Firewall C. Trojan horse D. Hub
4. Which device is primarily used to prevent unauthorized access to or from a private
network?
A. Modem B. Router C. Firewall D. Switch
5. A Denial of Service (DoS) attack is used to:
A. Encrypt data
B. Block network services
C. Speed up network traffic
D. Fix vulnerabilities
6. What is the best countermeasure for phishing attacks?
A. Increase RAM
B. Install a switch
C. User awareness and email filtering
D. Change monitors regularly
7. Which protocol is used for secure web browsing? A. HTTP B. FTP C. SMTP D. HTTPS
8. What does IDS stand for in cybersecurity?
A. Internet Distribution System B. Information Defense System C. Intrusion Detection
System D. Internal Data Storage
9. Which of the following is a physical security measure?
A. Strong password B. Firewalls C. Biometric access D. Encryption
10. A worm differs from a virus in that:
A. Worms require a host to run B. Worms can self-replicate and spread independently
C. Worms do not damage files D. Viruses are not dangerous

Section B: Structured Questions (5 marks each)

Answer all questions clearly and concisely.

11. Define the following key network security concepts:


a) Confidentiality
b) Integrity
c) Availability
12. Explain the concept of a man-in-the-middle attack. Suggest two ways to prevent it.
13. Briefly describe the role of encryption in protecting data transmitted over a network.
14. What is a firewall, and how does it contribute to network security? Mention two types of
firewalls.
15. List and explain three common network attacks and the corresponding
countermeasures for each.

Section C: Scenario-Based Questions (10 marks each)

16. A company is experiencing suspicious traffic on its network. Some employees report
slow access and unknown processes running on their computers.
a) Identify three possible causes of the problem.
b) Outline a step-by-step response plan to diagnose and stop the attack.
c) Suggest two tools that can be used in such a scenario.

17. You are hired as a network security analyst in a school. The principal is concerned about
students accessing harmful content online.
a) Propose three measures to secure the school’s network.
b) Recommend a monitoring or filtering tool.
c) Explain how educating users (students and staff) contributes to network security.

You might also like