SSS811S - SECURE SYSTEMS - 2ND OPP - JULY 2024


SSS811S - SECURE SYSTEMS - 2ND OPP - JULY 2024



1 Page 1

▲back to top


nAml BIA UnlVERSITY
0 F SCIEnCEAno TECHno LOGY
Facultyof Computingand
Informatics
Schoool f Computing
Departmentof Software
Engineering
13JacksonKaujeuaStreet
PrivateBag13388
Windhoek
NAMIBIA
T: +264612072052
F: +264612079052
E: dse@nust.na
W: www.nust.na
DEPARTMENTOF SOFTWAREENGINEERING
QUALIFICATION:BACHELOROF COMPUTERSCIENCE(HONS SOFTWAREDEVELOPMENT)
QUALIFICATIONCODE:08BCHS
LEVEL:8
COURSE:SECURESYSTEMS
COURSECODE:SSS811S
DATE:JULY2024
SESSIONT: HEORY
DURATION:3 HOURS
MARKS: 100
SECONDOPPORTUNITY/ SUPPLEMENTARYEXAMINATION
EXAMINER (S)
MR ARPIT JAIN
MODERATOR:
MR PALl<ESHl<ATARIA
THE QUESTIONPAPERCONSISTSOF 2 PAGES
(Including this front page)
INSTRUCTIONS
1. Answer ALL the questions.
2. Write clearly and neatly.
3. In answering questions, be guided by the allocated marks.
4. Number your answers clearly following the numbering used in this
question paper.
PERMISSIBLEMATERIALS
1. None

2 Page 2

▲back to top


Question 1
[20]
(a) What are the defence techniques you can implement with different stages of a Cyber Kill Chain?
Question2
[20]
(a) What is Threat modelling and Vulnerability discovery?
[10]
(b) How can you architect your infrastructure and processesto be responsive to the inevitable
changes you'll face?
[10]
Question3
[20]
(a) How to classify access based on risk and examine best practices that enforce least privilege. [10]
(b) What are the Policy Framework for Authentication and Authorization Decisions
[10]
Question4
[20]
(a) How do you change your design while changing the landscape?
[10]
(b) What is the complication arriving when plan changes?
[10]
Question 5
[20]
(a) What are the techniques to deploy the response mechanism?
[10]
(b) What are the design principles for the system to be resilient under adverse or unexpected
circumstances
[10]