MINISTERE DE L’ENSEIGNEMENT SUPERIEUR REPUBLIQUE DU CAMEROUN
Paix-Travail-Patrie
INSTITUT UNIVERSITAIRE SIANTOU
ECOLE SUPERIEURE DES TECHNOLOGIES ET INDUSTRIES SIANTOU
ECOLE SUPERIEURE DE MANAGEMENT, DE GESTION ET DE COMMUNICATION SIANTOU
ECOLE SUPERIEURE DES SCIENCES DE LA SANTE SIANTOU
Discipline Travail Efficacité BTS DSEP HND LICENCES PROFESSIONNELLES BACHELOR MASTERS
CAPACITE EN DROIT FORMATION PROFESSIONNELLE
L’Ecole des Majors
Année académique : 20…24…/20…25….. Examen : 2e Semestre
Session : Normale Cycle :HND1
Département : Engineering Spécialité(s) : nws1
Durée : 2hrs Examinateur : Engr. Kimbi Eric
EPREUVE DE :NETWORK SECURITY
Section A: Multiple Choice Questions (1 mark each)
Choose the correct option.
1. Which of the following best defines network security?
A. Using antivirus software only
B. Preventing unauthorized access and misuse of computer networks
C. Disabling firewalls
D. Hiding IP addresses
2. What is the main goal of confidentiality in network security?
A. Preventing loss of data
B. Protecting data from unauthorized access
C. Monitoring network traffic
D. Backup data regularly
3. Which of the following is a form of malware?
A. Switch B. Firewall C. Trojan horse D. Hub
4. Which device is primarily used to prevent unauthorized access to or from a private
network?
A. Modem B. Router C. Firewall D. Switch
5. A Denial of Service (DoS) attack is used to:
A. Encrypt data
B. Block network services
C. Speed up network traffic
D. Fix vulnerabilities
6. What is the best countermeasure for phishing attacks?
A. Increase RAM
B. Install a switch
C. User awareness and email filtering
D. Change monitors regularly
7. Which protocol is used for secure web browsing? A. HTTP B. FTP C. SMTP D. HTTPS
8. What does IDS stand for in cybersecurity?
A. Internet Distribution System B. Information Defense System C. Intrusion Detection
System D. Internal Data Storage
9. Which of the following is a physical security measure?
A. Strong password B. Firewalls C. Biometric access D. Encryption
10. A worm differs from a virus in that:
A. Worms require a host to run B. Worms can self-replicate and spread independently
C. Worms do not damage files D. Viruses are not dangerous
Section B: Structured Questions (5 marks each)
Answer all questions clearly and concisely.
11. Define the following key network security concepts:
a) Confidentiality
b) Integrity
c) Availability
12. Explain the concept of a man-in-the-middle attack. Suggest two ways to prevent it.
13. Briefly describe the role of encryption in protecting data transmitted over a network.
14. What is a firewall, and how does it contribute to network security? Mention two types of
firewalls.
15. List and explain three common network attacks and the corresponding
countermeasures for each.
Section C: Scenario-Based Questions (10 marks each)
16. A company is experiencing suspicious traffic on its network. Some employees report
slow access and unknown processes running on their computers.
a) Identify three possible causes of the problem.
b) Outline a step-by-step response plan to diagnose and stop the attack.
c) Suggest two tools that can be used in such a scenario.
17. You are hired as a network security analyst in a school. The principal is concerned about
students accessing harmful content online.
a) Propose three measures to secure the school’s network.
b) Recommend a monitoring or filtering tool.
c) Explain how educating users (students and staff) contributes to network security.