INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

Similar documents
INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) short answer and structured essay questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan. Jawab SEMUA soalan.

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2)structured questions.answer ALL questions.

INSTRUCTION: This section consists of TEN (10) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of FOUR (4) questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi EMPAT (4) soalan. Jawab SEMUA soalan.

INSTRUCTION: This section consists of TWO (2)short answers and TWO (2) structured essays. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan. Jawab SEMUA soalan.

PART A SULIT (EKT 221) BAHAGIAN A. Answer ALL questions. Question 1. a) Briefly explain the concept of Clock Gating.

EEE 428 SISTEM KOMPUTER

UNIVERSITI SAINS MALAYSIA. CMT322/CMM323 Web Engineering & Technologies [Kejuruteraan & Teknologi Web]

UNIVERSITI SAINS MALAYSIA. CST332 Internet Protocols. Architecture & Routing [Protokol, Seni Bina & Penghalaan Internet]

UNIVERSITI SAINS MALAYSIA. CST333 Distributed & Grid Computing [Perkomputeran Teragih & Grid]

ssk 2023 asas komunikasi dan rangkaian TOPIK 4.0 PENGALAMATAN RANGKAIAN Minggu 11

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

COMBINING TABLES. Akademi Audit Negara. CAATs ASAS ACL / 1

UNIVERSITI SAINS MALAYSIA. CST232 Operating Systems [Sistem Pengendalian]

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

PANDUAN PENGGUNA (SUPPLIER) MAINTAIN CERTIFICATES/SUPPLIER DETAILS SUPPLIER RELATIONSHIP MANAGEMENT SUPPLY CHAIN MANAGEMENT SYSTEM (SCMS)

PANDUAN PENGGUNA (SUPPLIER) MAINTAIN CERTIFICATES/SUPPLIER DETAILS SUPPLIER RELATIONSHIP MANAGEMENT SUPPLY CHAIN MANAGEMENT SYSTEM (SCMS)

ISU DAN CABARAN PELAKSANAAN SISTEM PENGURUSAN KESELAMATAN MAKLUMAT (ISMS) 15 Jun 2016 Dewan Taklimat Serdang

UNIVERSITI SAINS MALAYSIA. CCS522 Advanced Data Communication & Computer Networks [Rangkaian Komputer & Komunikasi Data Lanjutan]

EEE348 INTRODUCTION TO INTEGRATED CIRCUIT DESIGN (PENGANTAR REKABENTUK LITAR BERSEPADU)

UNIVERSITI SAINS MALAYSIA. CST334 Network Monitoring & Security [Pengawasan & Keselamatan Rangkaian]

UNIVERSITI SAINS MALAYSIA. CCS521 Advanced Distributed Systems Concepts and Design [Konsep dan Reka Bentuk Sistem Teragih Maju]

PEPERIKSAAN PERCUBAAN SIJIL PELAJARAN MALAYSIA /1

EEE 348 PENGANTAR REKABENTUK LITAR BERSEPADU

DCG3083 : PHOTOGRAMMETRY

UNIVERSITI SAINS MALAYSIA. CPT344 Computer Vision & Image Processing [Penglihatan Komputer & Pemprosesan Imej]

CPT211/CPM313 Programming Language Concepts & Paradigms [Konsep & Paradigma Bahasa Pengaturcaraan]

UNIVERSITI SAINS MALAYSIA. Peperiksaan Semester Pertama Sidang Akademik 2003/2004. September/Oktober 2003

Panduan Menggunakan Autoresponder FreeAutobot.com

...a- JEE ELEKTRONIK DIGIT II. UNlVERSlTl SAINS MALAYSIA. Peperiksaan Semester Kedua Sidang Akademik FebruarVMac 2003.

MANAGE COURSE RESOURCES LABEL TEXT PAGE URL BOOK FILE FOLDER IMS CONTENT PACKAGE

[40 marks] [40 marks] Answer all questions. Jawab semua soalan.

UNIVERSITI SAINS MALAYSIA. CCS522 Advanced Data Communication and Computer Networks [Rangkaian Komputer dan Komunikasi Data Lanjutan]

UNIVERSITI SAINS MALAYSIA. CCS523 Computer Security & Cryptography [Keselamatan Komputer & Kriptografi]

MSS 317 Coding Theory [Teori Pengekodan]

UNIVERSITI SAINS MALAYSIA

DOKUMEN TIDAK TERKAWAL

UNIVERSITI SAINS MALAYSIA. CST331 Principles of Parallel & Distributed Programming [Prinsip Pengaturcaraan Selari & Teragih]

UNIVERSITI SAINS MALAYSIA. CMT422 Multimedia Information Systems & Management [Sistem & Pengurusan Maklumat Multimedia]

UNIVERSITI SAINS MALAYSIA. CPT211-CPM313 Programming Language Concepts & Paradigm [Konsep & Paradigma Bahasa Pengaturcaraan]

Registration of Supplier (ROS) TM Supplier Registration Renewal via SUS Portal (Pembaharuan Pendaftaran Pembekal TM melalui SUS Portal)

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

UNIVERSITI SAINS MALAYSIA. CPT113 Programming Methodology & Data Structures [Metodologi Pengaturcaraan & Struktur Data]

Manual Pengguna. PCN Online Service Fulfillment System

UNIVERSITI SAINS MALAYSIA. CST131 Computer Organisation [Organisasi Komputer]

[40 marks] [40 markah] Answer all questions. Jawab semua soalan.

Registration of Supplier (ROS) TM Supplier Registration Renewal via SUS Portal (Pembaharuan Pendaftaran Pembekal TM melalui SUS Portal)

UNIVERSITI SAINS MALAYSIA. CPT111/CPM111 Principles of Programming [Prinsip Pengaturcaraan]

Semasa buku ini ditulis XAMPP mengandungi empat versi:

1. Threats bermaksud ancaman, atau lebih dikenali sebagai malware (malicious

UNIVERSITI SAINS MALAYSIA. CST331 Principles of Parallel & Distributed Programming [Prinsip Pengaturcaraan Selari & Teragih]

UNIVERSITI SAINS MALAYSIA. CST131 Computer Organisation [Organisasi Komputer]

UNIVERSITI SAINS MALAYSIA. CIT502 Pengaturcaraan dan Kejuruteraan Perisian Berorientasi Objek

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

Panduan Pengguna Autodesk Education Community

Section A Bahagian A. 2 MARK 1 was invented by Harvard University in MARK 1 telah dicipta oleh Universiti Harvad pada tahun...

TUITION CENTRE MANAGEMENT SYSTEM (TCMS) ZARIFAH BINTI MOHD PAHMI UNIVERSITI TEKNIKAL MALAYSIA MELAKA

MSS 318 Discrete Mathematics [Matematik Diskret]

PANDUAN PENGGUNA (SUPPLIER) e-purchase ORDER FOR SERVICES

UNIVERSITI SAINS MALAYSIA. CMT324 Computer Graphics & Visual Computing [Grafik Komputer & Perkomputeran Visual]

PEPERIKSAAN PERCUBAAN SIJIL PELAJARAN MALAYSIA /1

FIRST TIME LOGIN & SELF REGISTRATION USER GUIDE LOG MASUK KALI PERTAMA & PENDAFTARAN SENDIRI PANDUAN PENGGUNA

-2- c) Bincangkan mengapa pemprosesan wafer perlu dijalankan di dalam persekitaran bilik bersih. [30 markah]

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

MICROSOFT EXCEL. Membina Hamparan Elektronik Fungsi Hamparan Elektronik

Section A Bahagian A. [36 marks] [36 markah]

UNIVERSITI SAINS MALAYSIA. CCS523 Computer Security & Cryptography [Keselamatan Komputer & Kriptografi]

Pengenalan Sistem Maklumat Dalam Pendidikan

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

VIRTUAL PRIVATE NETWORK: ARCHITECTURE AND IMPLEMENTATIONS

A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

UNIVERSITI SAINS MALAYSIA. CST131 Computer Organisation [Organisasi Komputer]

PERKHIDMATAN KREDIT DAN PERBANKAN PROSEDUR UNIT KOMPUTER. Proses Backup ( Windows) BPKP/KlOK-118 Bilangan Semakan : Q Tarikh :

MODELLING AND REASONING OF LARGE SCALE FUZZY PETRI NET USING INFERENCE PATH AND BIDIRECTIONAL METHODS ZHOU KAIQING

UNIVERSITI SAINS MALAYSIA. CMT224/CMM221 Multimedia Systems [Sistem Multimedia]

UNIVERSITI SAINS MALAYSIA. CST431/CST335 Systems Security & Protection [Keselamatan & Perlindungan Sistem]

UNIVERSITI SAINS MALAYSIA. CPT103/ CPM211 Struktur Data & Paradigma Pengaturcaraan

MAT181 Programming For Scientific Applications [Pengaturcaraan Untuk Penggunaan Sains]

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

UNIVERSITI MALAYSIA SARAWAK KOTA SAMARAHAN SARAWAK THIRD SEMESTER EXAMINATION, APRIL 2013 SESSION ITC 2053 OPERATING SYSTEM

UNIVERSITI SAINS MALAYSIA. CST234 Network Programming [Pengaturcaraan Rangkaian]

CPT111/CPM111 Principles of Programming [Prinsip Pengaturcaraan]

Information Security Management System ISO/IEC 27001:2013

UNIVERSITI MALAYSIA PERLIS. DNT 126 Basic Computer Programming [Asas Pengaturcaraan Komputer]

PANDUAN PENGGUNA (PENTADBIR SYSTEM/SYSTEM ADMINISTRATOR) (INFOTECH, BPPF DAN POLIS

Study of Distributed Coordination Function (DCF) and Enhanced DCF (EDCF) in IEEE MAC Protocols for Multimedia Applications.

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN

Transcription:

SECTION B : 55 MARKS BAHAGIAN B : 55 MARKAH INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan berstruktur. Jawab SEMUA soalan. QUESTION 1 SOALAN 1 a) i. State TWO (2) characteristics of Information System Security and describe each of it. Nyatakan DUA (2) ciri-ciri bagi Sistem Keselamatan Maklumat dan terangkan setiap daripadanya. ii. [4 marks] [4 markah] Decsribe briefly the threats terminology Terangkan secara ringkas ancaman terminology berikut: a. Accidental data Loss / Kemalangan Kehilangan Data b. Information theft / Kecurian Maklumat c. Unauthorized disclosure / Pendedahan Yang Tidak Dibenarkan b) State the definition of Vulnerabilities in the information systems. Nyatakan definisi Vulnerability di dalam sistem maklumat c) Determine the THREE (3) cause of vulnerabilities that comes from the security policy weakness. Tentukan TIGA (3) kesan akibat kelemahan polisi keselamatan. 19 SULIT

d) Explain THREE (3) characteristics of a Virus. Terangkan TIGA (3) ciri-ciri bagi Virus. e) i. State THREE (3) types of firewall Senaraikan TIGA (3) jenis firewall. ii. Compare between static packets filters and dynamic packet filter in relation to security features that each technology provides. Bezakan antara Paket Penapis Statik dan Paket Penapis Dynamik dalam kaitan antara keselamatan setiap teknologi yang di sediakan. [5 marks] [5 markah] f) Illustrate a diagram that shows the operations of Screened-host firewall architecture. Ilustrasikan sebuah rajah yang menggambarkan operasi bagi senibina Firewall Screened-host. 20 SULIT

QUESTION 2 SOALAN 2 a) Recognize FOUR (4) basic security level to be implemented in the Operating Systems. Kenalpasti EMPAT (4) aras keselamatan asas yang boleh diaplikasikan di dalam Pengoperasian. [4 marks] [4 markah] b) Interpret THREE (3) characteristics of a strong password to be implemented for the system policy. Tafsirkan TIGA (3) ciri-ciri bagi sebuah katalaluan yang kukuh untuk diaplikasikan di dalam polisi sistem. c) Define the following cryptographic terminologies below : Definisikan terma-terma cryptographic di bawah: a) Authentication / Pengesahan b) Encryption / Penyulitan c) Ciphertext / Ciphertext d) Decryption / Penyahsulitan e) Cryptanalysis / Cryptanalysis [5 marks] [5 markah] 21 SULIT

d) 1 2 3 4 5 1 A B C D E 2 F G H I/J K 3 L M N O P 4 Q R S T U 5 V W X Y Z Figure 10: Method of encryption / Rajah 10: Kaedah penyulitan i. Based on Figure 10, identify the accurate method of encryption. Berdasarkan Rajah 10, kenalpasti kaedah penyulitan yang tepat. [1 mark] [1 markah] ii. Using a method of encryption above, determine ciphertext for plaintext message below Dengan menggunakan kaedah penyulitan di atas, tentukan kod rahsia bagi mesej asal di bawah Plaintext: SYSTEM SECURITY Ciphertext: iii. Determine the plaintext message after decryption process for cipher text below; Tentukan mesej asal selepas proses penyahsulitan untuk teks cipher di bawah Ciphertext: 22, 43,43,41,13,54,31,52 Plaintext: 22 SULIT

e) Illustrate a diagram that shows the operations of Asymmetric Cryptography. Ilustrasikan sebuah rajah yang menggambarkan mengenai operasi Kriptografi Asimetrik. [5 marks] [5 markah] f) State TWO (2) types of disaster that could be threatened to the information security. Nyatakan DUA (2) jenis bencana yang boleh menjadi ancaman kepada keselamatan maklumat. g) Discuss the characteristics of the RAID 0, RAID 1 and RAID 5 in handling disaster. Bincangkan ciri-ciri khas bagi RAID 0, RAID 1 dan RAID 5 di dalam pengendalian bencana. 23 SULIT

h) The network administrators need to only copy files that have been recently added or changed. The typical procedure is to perform a full backup once a week and X backups nightly. If they need to rebuild the server, first step is needed to restore the full backup and then restore every X backup created since the full backup. Based on this scenario, determine ONE (1) of tape backup refers to that X backup. Pentadbir rangkaian perlu membuat salinan hanya fail-fail yang bertambah atau berubah sahaja. Prosedur biasanya ialah melaksanakan sandaran penuh pada satu minggu dan pada tiap-tiap malam melaksanakan sandaran X. Jika mereka perlu membina semula pelayan, langkah pertama yang diperlukan ialah membuat pemulihan sandaran penuh dan kemudian membuat pemulihan setiap sandaran X yang dibuat sejak sandaran penuh. Berdasarkan senario ini, Kenalpasti SATU (1) sandaran pita yang merujuk pada sandaran X. SOALAN TAMAT 24 SULIT