SECTIONA: TRUEOR FALSE
This section consist of 20 questions. Answer all the questions
Each correct answer is allocated 2 Marks
Write True or False for Questions 1 to 20.
1. One of the software used to monitor the status of any network packet sent is Wireshark.
[2 Marks]
2. Plagiarism statement must be on top of a VPL Python program on elearning. [2 Marks]
3. Malware stands for Multipurpose software.
[2 Marks]
4. In order to ensure the security of the data/ information, we need to Decrypt the data.[2 Marks]
5. TCP/IP stands for Transmission Control Protocol/ internet prototype.
[2 Marks]
6. Hackers usually use the computer virus to send good will messages to users.
[2 Marks]
7. To protect the computer system against the hacker and different kind of viruses, one must
always keep firewall on in the computer system.
[2Marlcs]
8. A software program or a hardware device that filters all data packets coming through
the internet, a network, etc, is known as Cookies.
[2 Marks]
9. Worm is considered as an unsolicited commercial email.
[2 Marks]
10. One way to prevent password attack is use of surname as password.
[2 Marks]
11. A ransomware attacks may be similar to kidnapers kidnap data for money.
[2 Marks]
12. Insider attacks involve someone outside the organization carrying out an attack. [2 Marks]
13. Denial of Service (DoS) and Distributed DoS are the same.
[2 Marks]
14. Passiveattacks and Active attacks are types of attacks.
[2 Marks]
15. Since cyber attackers are now using Artificial Intelligence {Al) tools to carryout attacks, it is
essential for organisations to Upgrade their protection mechanism from conventional
defense to Al-based defense mechanism.
[2 Marks]
16. Additional functionalities to cater for the shortcomings of IPV4, includes, security,
authentication and integrity.
[2 Marks]
17. The IP Address: 210.125.15.100 is a ClassA.
[2 Marks]
18. SQLinjection involves adding malicious code to a database query to gain unauthorized
access to a web application's database.
[2 Marks]
19. Command injection is a database injection technique that exploits a security flaw. [2 Marks]
20. The netid of the IP Address: 128.98.89.129 is 128.98.0.0
[2 Marks]
SECTIONB: NETWORKPACKETS
Explain each of the following send statement and the possible output, when is executed on
Scapy environment. For instance, the statement send(IP{dst='127.0.0.1')) creates a network
packet with destination IP address 127.0.0.1. When executed on Scapy, the output will be:
Sent 1 packets
21. send(IP{dst='127.0.0.1'), return_packets=True)
(2 Marks]
22. send{IP{src='128.99.4.123', dst='127.110.120.100'))
[2 Marks]
23. send{IP{ttl=64, src='128.99.4.123', dst='127.110.120.100'))
(2 Marks
24. send{IP(ttl=64, src='128.99.4.123', dst='127.110.120.100'), count=3)
(2 Marks]
25. send(I P(ttl=64, src='128.99.4.123', dst='127. 110.120.100')/TCP{)/"Welcome Class") (2 Marks]
26. send{IP{ttl=64, src='128.99.4.123', dst = '127.110.120.100')/TCP
(sport=135,dport=136)/"Welcome to Python Lecture", count=3)
(2 Marks]
2