SECTION A (Answer ALL questions in this section)
1. Decrypt the following message encrypted using the Caesar Cipher: JUDGXDWH (03 marks)
2. Explain how an email can be made ‘non-refutable’. (04 marks)
3. Calculate the RSA Euler totient where p = 19 and q = 7. Fully detail your calculation (03 marks)
4. Use the Vigenère Square below to encode the word DIFFICULT using the Vigenère cipher and a keyword of EASY. Provide a detailed description of the encryption process. (10 marks) A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V X X Y Z A B C D E F G H I J K L M N O P Q R S T U V W Y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
5. Encrypt the word METALLIC using a Playfair cipher with a keyword of PLASTIC. Provide a detailed explanation for each stage of the encryption. (10 marks)
6. Describe the difference between an unconditionally secure cipher and a computationally secure cipher. (04 marks)
7. Decode the following message that has been encoded using a Rail Fence Cipher: ILATSANIWLSHEMAOIPSIXITN Briefly describe how such an encoding cipher works. (06 marks)
8. Briefly explain why asymmetric encryption won’t replace symmetric encryption for all network security. (05 marks) 9. Briefly explain how secure a computationally secure cipher actually is. (05 marks)
END OF SECTION A
SECTION B (Answer ANY TWO questions in this section)
QUESTION 1: TCP/IP (25 Marks) 1a. State the FIVE requirements that a public key cryptosystem must fulfil in order to be considered a secure algorithm. (05 marks) 1b. Briefly describe THREE of the major flaws in WEP’s encryption mechanism. (10 marks) 1c. Discuss 5 drawbacks of IPv4 and how IPv6 addresses those drawbacks. (10 marks)
QUESTION 2: IDPS (25 Marks) 2a. Explain the importance of digital signatures and describe in detail how they work. (08 marks) 2b. Briefly describe FOUR of the requirements that a public key cryptosystem must fulfil in order to be considered a secure algorithm. (08 marks) 2c. Explain why TKIP was suggested as a possible interim replacement for WEP even though AES (Advanced Encryption Standard) was known to be a stronger encryption method. (04 marks) 2d. Briefly explain why the integrity mechanism associated with AES-CCMP (Advanced Encryption Standard – Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is considered a particularly strong one. (05 marks)
QUESTION 3: FIREWALLS (25 Marks) 3a. List SIX examples of intrusion attack (06 marks) 3b. State what information is used by a typical packet filtering firewall (04 marks) 3c. Briefly describe what a circuit-level gateway is and describe how it works (07 marks) 3d. Outline the important differences between the following types of firewall: packet filtering; stateful packet filtering; application proxy; and circuit-level gateway (08 marks)
QUESTION 4: CLOUD COMPUTING (25 Marks) 4a. What are the 5 essential Characteristics of Cloud Computing? (05 marks) 4b. List the types of Cloud Computing service models. Briefly describe them. (03 marks) 4c. What are the advantages and disadvantages of cloud computing? (04 marks) 4d. What are the types of deployment models of Cloud Computing? Explain briefly. (04 marks) 4e. List NINE potential confidentiality concerns associated with moving corporate data from a corporation’s own on-premises local network to a public Cloud. (09 marks
Get expert help for IT Networking an cloud security and many more. 24X7 help, plag free solution. Order online now!