SECTIONA: TRUEOR FALSE
This section consist of 20 questions. Answer all the questions
Each correct answer is allocated 2 Marks
Write True or False for Questions 1 to 20.
1. Attachments should always be treated with caution, even if you know the sender.
[2 Marks]
2. Usingtwo-factor authentication is not an effective tool for securingyour account.
[2 Marks]
3. I have anti-virus protection, so when it comes to network security, I'm all set.
[2 Marks]
4. Cybersecurityis IT'sresponsibility. The everyday end-usersin the office don't need to worry about
this topic.
(2 Marks]
5. Software and application updates are not important and canjust be ignored.
[2 Marks]
6. Hackers usually used the computer virus to send good will messages to users. [2 Marks]
7. Security incidents are NOT a potential threat to the integrity of personally identifiable information.
[2Marks]
8. A software program or a hardware device that filters all data packets coming through
the internet, a network, etc, is known as Cookies.
[2 Marks]
9. Security is an individual's right to control the use or disclosureof personal information. [2 Marks]
10. Users are advised to use their first name as password.
[2 Marks]
11. A ransom ware attacks may be similar to kidnapers kidnap data for money.
[2 Marks]
12. Insider attacks involve someone outside the organization carrying out an attack. (2 Marks]
13. Security refers to the mechanisms in place to protect the confidentiality and privacy of
personal information.
[2 Marks]
14. Passive attacks and Active attacks are types of attacks.
(2 Marks]
15. Security is the protection of information and information systems from unauthorized access,
use, disclosure, disruption, modification, or destruction in order to provide confidentiality,
integrity, and availability.
(2 Marks]
16. Additional functionalities to cater for the short comings of IPV4, includes, security,
authentication and integrity.
(2 Marks]
17. The class of IP Address: 78.125.15.100
is A
[2 Marks]
18. Adding malicious codes to a database query to gain unauthorized access to a web
application's database is known as SQL injection.
(2 Marks]
19. Command injection is a database injection technique that exploits a security flaw. (2 Marks]
20. Security incidents are NOTa potential threat to the integrity of personally identifiable information.
[2 Marks]
SECTIONB: NETWORKPACKETSAND IP ADDRESS
Describe the following send commands:
21. send(IP(dst='127.0.0.1'), return_packets=True)
22. send(IP(src='128.99.4.123', dst='127.110.120.100'))
23. send(IP(ttl=64, src='128.99.4.123', dst='127.110.120.100'))
(2 Marks]
(2 Marks]
[2 Marks]
Briefly explain the following with example(s):
24. IPv6 Compressed
25. IPv6 Uncompressed
25. IPv6 Fully Uncompressed
(2 Marks]
(2 Marks]
(2 Marks]
2