NSC Exam Paper Spring 2019
NSC Exam Paper Spring 2019
06 March 2019
Examination Paper
Time: 3 hours
Marks
Question 1
d) The RSA (Rivest, Shamir and Adleman) Algorithm involves three steps. State 3
the THREE (3) steps.
Total 10 Marks
Question 2
a) Public Key Infrastructure (PKI) is a security architecture that has been introduced 3
to provide an increased level of confidence for exchanging information. There
are three essential components of PKI. One of these is a Digital Certificate.
Explain what is meant by the term Digital Certificate.
c) There are two ways to generate a Digital Certificate (DC). One of these is using 2
a popular encryption software called PGP, which provides the user with the ability
to generate their own digital certificate. State what the acronym PGP stands for
and who else can generate the digital certificate.
d) Explain what is meant by the term Revocation with regards to Digital Certificates. 3
Total 10 Marks
Page 2 of 6
Network Security and Cryptography © NCC Education Limited 2019
Marks
Question 3
a) Produce a diagram to demonstrate how Transport Level Security (TLS) fits with 6
other common Internet protocols in a protocol stack. Your diagram should be
illustrated by showing named protocols.
b) Internet Protocol Security (IPSec) provides security at the IP layer for other 2
TCP/IP protocols and applications to use. One IPSec Core Protocol is the IPSec
Authentication Header (AH). State TWO (2) actions the AH provides.
Total 10 Marks
Question 4
a) When issuing Digital Certificates (DC), public Certification Authorities (CAs) will 3
include information in the key usage field of the certificate to state what the
private key may be used for. State THREE (3) possible purposes the private key
may be used for.
b) Data in Digital Certificates (DC) should conform to the ITU (IETF) standard 3
X.509. State THREE (3) types of information that should be included to ensure
the data in the certificate conforms to the standard.
Total 10 Marks
Page 3 of 6
Network Security and Cryptography © NCC Education Limited 2019
Marks
Question 5
b) Operating systems such as Windows, IOS and Linux are commonly used in most 2
industries and businesses. State TWO (2) reasons why using a common
operating system may make your network vulnerable.
c) As part of vulnerability prevention port scanning can be carried out to ensure that 3
ports are not left open, and therefore vulnerable to attack. There are many types
of port scanning. Most use TCP, however, UDP (User Datagram Protocol) Scans
are also used. Explain how a UDP Scan is carried out.
d) UDP is considered less reliable than TCP Scans. State TWO (2) reasons why it 2
is considered less reliable.
Total 10 Marks
Question 6
a) Authentication is required for most systems to ensure that the user and the 6
system are protected. Levels of authentication are increased depending on the
security level required. Commonly banking systems now use Three-factor
authentication. State the THREE (3) factors that need to be used to gain access
with examples for each factor:
c) Biometric data is often used to form part of the authentication process for 2
systems. When registering biometric data, measurements are taken. Explain
how these measurements are managed and recorded.
Total 10 Marks
Page 4 of 6
Network Security and Cryptography © NCC Education Limited 2019
Marks
Question 7
a) NAT is used as part of Access Control for networks. State what the acronym 2
NAT stands for and what it is used for.
b) Explain how Dynamic NAT is used and state one advantage of using it. 3
d) NAT can aid Network Administration. State TWO (2) ways in which it may do 2
this.
Total 10 Marks
Question 8
b) A VPN creates a secure tunnel between the remote user and the business. 3
Draw a diagram to show how the remote user uses a VPN to connect to the
business. You should label the components of your diagram.
Total 10 Marks
Page 5 of 6
Network Security and Cryptography © NCC Education Limited 2019
Marks
Question 9
a) Use of wireless networks in the home are common place. Wireless Equivalent 2
Privacy (WEP) is the original component of the IEEE 802.11 standard. However,
it had some weaknesses. State TWO (2) weaknesses of WEP.
d) State TWO (2) reasons why Pre-shared Key (PSK) Mode is often used in the 2
home or small offices.
Total 10 Marks
Question 10
a) The use of passwords alone can make a system vulnerable to attack. State 1
ONE (1) way a password can be accessed, other than using an attack.
b) Two common attacks used to crack passwords are Dictionary attacks and Brute 3
force attacks. State which one you feel is the greatest risk to most systems if
used and explain why you have chosen this option.
c) Mark is a new Head teacher at a school you work for as Network Manager. Mark 6
is quite knowledgeable regarding computer systems and networks. He has
asked you to write a report stating the preventative measures you use to protect
the school’s network against vulnerabilities. Provide THREE (3) measures you
would include in your report with a brief supporting explanation of how they help
to prevent vulnerabilities occurring.
Total 10 Marks
End of Paper
Page 6 of 6
Network Security and Cryptography © NCC Education Limited 2019