INSTRUCTION: This section consists of TEN (10) structured questions. Answer ALL questions.

Similar documents
INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2)short answers and TWO (2) structured essays. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan. Jawab SEMUA soalan.

INSTRUCTION: This section consists of TWO (2) short answer and structured essay questions. Answer ALL questions.

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

UNIVERSITI SAINS MALAYSIA. CST332 Internet Protocols. Architecture & Routing [Protokol, Seni Bina & Penghalaan Internet]

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan. Jawab SEMUA soalan.

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of FOUR (4) questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi EMPAT (4) soalan. Jawab SEMUA soalan.

UNIVERSITI SAINS MALAYSIA. CST333 Distributed & Grid Computing [Perkomputeran Teragih & Grid]

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2)structured questions.answer ALL questions.

UNIVERSITI SAINS MALAYSIA. CMT322/CMM323 Web Engineering & Technologies [Kejuruteraan & Teknologi Web]

UNIVERSITI SAINS MALAYSIA. CCS521 Advanced Distributed Systems Concepts and Design [Konsep dan Reka Bentuk Sistem Teragih Maju]

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

UNIVERSITI SAINS MALAYSIA. CST334 Network Monitoring & Security [Pengawasan & Keselamatan Rangkaian]

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

UNIVERSITI SAINS MALAYSIA. Peperiksaan Semester Pertama Sidang Akademik 2003/2004. September/Oktober 2003

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

UNIVERSITI SAINS MALAYSIA

CPT211/CPM313 Programming Language Concepts & Paradigms [Konsep & Paradigma Bahasa Pengaturcaraan]

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

PART A SULIT (EKT 221) BAHAGIAN A. Answer ALL questions. Question 1. a) Briefly explain the concept of Clock Gating.

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK

EEE 428 SISTEM KOMPUTER

UNIVERSITI SAINS MALAYSIA. CST131 Computer Organisation [Organisasi Komputer]

UNIVERSITI SAINS MALAYSIA. CCS522 Advanced Data Communication & Computer Networks [Rangkaian Komputer & Komunikasi Data Lanjutan]

UNIVERSITI SAINS MALAYSIA. CPT211-CPM313 Programming Language Concepts & Paradigm [Konsep & Paradigma Bahasa Pengaturcaraan]

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

UNIVERSITI SAINS MALAYSIA. CPT344 Computer Vision & Image Processing [Penglihatan Komputer & Pemprosesan Imej]

EEE348 INTRODUCTION TO INTEGRATED CIRCUIT DESIGN (PENGANTAR REKABENTUK LITAR BERSEPADU)

...a- JEE ELEKTRONIK DIGIT II. UNlVERSlTl SAINS MALAYSIA. Peperiksaan Semester Kedua Sidang Akademik FebruarVMac 2003.

UNIVERSITI SAINS MALAYSIA. CCS522 Advanced Data Communication and Computer Networks [Rangkaian Komputer dan Komunikasi Data Lanjutan]

UNIVERSITI SAINS MALAYSIA. CMT422 Multimedia Information Systems & Management [Sistem & Pengurusan Maklumat Multimedia]

DOKUMEN TIDAK TERKAWAL

PANDUAN PENGGUNA (SUPPLIER) MAINTAIN CERTIFICATES/SUPPLIER DETAILS SUPPLIER RELATIONSHIP MANAGEMENT SUPPLY CHAIN MANAGEMENT SYSTEM (SCMS)

Prepared by: Assoc. Prof. Dr Bahaman Abu Samah Department of Professional Development and Continuing Education Faculty of Educational Studies

Information Security Management System ISO/IEC 27001:2013

PANDUAN PENGGUNA (SUPPLIER) MAINTAIN CERTIFICATES/SUPPLIER DETAILS SUPPLIER RELATIONSHIP MANAGEMENT SUPPLY CHAIN MANAGEMENT SYSTEM (SCMS)

UNIVERSITI SAINS MALAYSIA. CST232 Operating Systems [Sistem Pengendalian]

ssk 2023 asas komunikasi dan rangkaian TOPIK 4.0 PENGALAMATAN RANGKAIAN Minggu 11

3.0 PERKHIDMATAN RANGKAIAN

UNIVERSITI SAINS MALAYSIA. CST131 Computer Organisation [Organisasi Komputer]

PEPERIKSAAN PERCUBAAN SIJIL PELAJARAN MALAYSIA /1

MANAGE COURSE RESOURCES LABEL TEXT PAGE URL BOOK FILE FOLDER IMS CONTENT PACKAGE

EEE 348 PENGANTAR REKABENTUK LITAR BERSEPADU

UNIVERSITI SAINS MALAYSIA. CST231/CSM331 Data Communications & Networks [Komunikasi Data & Rangkaian]

PANDUAN PENGGUNA (SUPPLIER) e-purchase ORDER FOR SERVICES

Bahagian A. Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian Jawapan. Setiap jawapan diperuntukkan satu markah.

-2- c) Bincangkan mengapa pemprosesan wafer perlu dijalankan di dalam persekitaran bilik bersih. [30 markah]

PEPERIKSAAN PERCUBAAN SIJIL PELAJARAN MALAYSIA /1

COMBINING TABLES. Akademi Audit Negara. CAATs ASAS ACL / 1

SKS 3124 PENDAWAIAN RANGKAIAN

Pengenalan Sistem Maklumat Dalam Pendidikan

UNIVERSITI SAINS MALAYSIA. CPT111/CPM111 Principles of Programming [Prinsip Pengaturcaraan]

DYNAMIC MOBILE SERVER FOR LIVE CASTING APPLICATIONS MUHAMMAD SAZALI BIN HISHAM UNIVERSITI TEKNOLOGI MALAYSIA

REGISTRATION GUIDE MCIS CUSTOMER PORTAL. Page 1

VIRTUAL PRIVATE NETWORK: ARCHITECTURE AND IMPLEMENTATIONS

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

UNIVERSITI SAINS MALAYSIA. CST234 Network Programming [Pengaturcaraan Rangkaian]

UNIVERSITI SAINS MALAYSIA

UNIVERSITI SAINS MALAYSIA. CPT103 Struktur Data & Paradigma Pengaturcaraan

1. Threats bermaksud ancaman, atau lebih dikenali sebagai malware (malicious


Pengguna akan diberikan Username dan Password oleh Administrator untuk login sebagai admin/conference Manager bagi conference yang akan diadakan.

DYNAMIC TIMESLOT ALLOCATION TECHNIQUE FOR WIRELESS SENSOR NETWORK OON ERIXNO

HERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)

Analysis SPM of year 2007, 2008, 2009, 2010, 2011, 2012, 2013 (Section B & C)

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

UNIVERSITI SAINS MALAYSIA. CST334 Network Monitoring & Security [Pengawasan & Keselamatan Rangkaian]

DCG3083 : PHOTOGRAMMETRY

UNIVERSITI SAINS MALAYSIA. CPT113 Programming Methodology & Data Structures [Metodologi Pengaturcaraan & Struktur Data]

UNIVERSITI SAINS MALAYSIA. CCS523 Computer Security & Cryptography [Keselamatan Komputer & Kriptografi]

Section A Bahagian A. [36 marks] [36 markah]

UNIVERSITI SAINS MALAYSIA. CST131 Computer Organisation [Organisasi Komputer]

DARI KAUNTER KE SISTEM DALAM TALIAN

Panduan Menggunakan Autoresponder FreeAutobot.com

TEKNOLOGI, GADJET & KEIBUBAPAAN

MSS 318 Discrete Mathematics [Matematik Diskret]

UNIVERSITI MALAYSIA PERLIS. DNT 126 Basic Computer Programming [Asas Pengaturcaraan Komputer]

Signature :.~... Name of supervisor :.. ~NA.lf... l.?.~mk.. :... 4./qD F. Universiti Teknikal Malaysia Melaka

ISU DAN CABARAN PELAKSANAAN SISTEM PENGURUSAN KESELAMATAN MAKLUMAT (ISMS) 15 Jun 2016 Dewan Taklimat Serdang

UNIVERSITI SAINS MALAYSIA. CST331 Principles of Parallel & Distributed Programming [Prinsip Pengaturcaraan Selari & Teragih]

ICT SPM 2011 SUGGESTION ANSWER. Section A

B,8 PERKHIDMATAN KREDIT DAN PERBANKAN. Pemindahan Data PROSEDUR UNIT KOMPUTER. BPKP/KlOK-117 Bilangan Semakan : 0 Tarikh : PERUBAHAN.

Section A Bahagian A. 2 MARK 1 was invented by Harvard University in MARK 1 telah dicipta oleh Universiti Harvad pada tahun...

[40 marks] [40 marks] Answer all questions. Jawab semua soalan.

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

FUZZY NEURAL NETWORKS WITH GENETIC ALGORITHM-BASED LEARNING METHOD M. REZA MASHINCHI UNIVERSITI TEKNOLOGI MALAYSIA

MICROSOFT EXCEL. Membina Hamparan Elektronik Fungsi Hamparan Elektronik

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

EEE 355 ROBOTIC & AUTOMATION [Robotik & Pengautomatan]

JABATAN KIMIA Kategori Arahan Kerja

UNIVERSITI SAINS MALAYSIA. CPT103/CPM211 Struktur Data & Paradigma Pengaturcaraan

Transcription:

SECTION B : 30 MARKS BAHAGIAN B : 30 MARKAH INSTRUCTION: This section consists of TEN (10) structured questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi SEPULUH (10) soalan berstruktur. Jawab SEMUA soalan. CLO1 QUESTION 1 List THREE (3) function of Network Operating System (NOS). SOALAN 1 Senaraikan TIGA (3) fungsi Sistem Operasi Rangkaian (NOS). CLO1 QUESTION 2 Draw a simple networking consisting of client, server, switch, router and backbone. SOALAN 2 Lukiskan rangkaian mudah yang terdiri daripada pelanggan, pelayan, suis, router, dan tulang belakang. QUESTION 3 A protocol is necessary in computer networks to allow access to all users. List THREE (3) networking protocol suites. SOALAN 3 Protokol adalah penting dalam rangkaian komputer untuk membolehkan semua pengguna boleh menggunakannya. Senaraikan TIGA (3) jenis protokol dalam rangkaian. 2 SULIT

QUESTION 4 List THREE (3) methods of allocating IP addresses in Dynamic Host Configuration Protocol (DHCP). SOALAN 4 Senaraikan TIGA (3) kaedah memperuntukkan alamat ke dalam Protokol Hos Dinamik Konfigurasi. (DHCP). QUESTION 5 Define :- i Digital Signal ii Broadcast Transmission SOALAN 5 Takrifkan :- i Isyarat Digital ii Penghantaran Penyiaran QUESTION 6 What are the functional differences between straight-through cable and cross-over cable? SOALAN 6 Apakah perbezaan fungsi antara kabel sambungan terus dan kabel terpintas. 3 SULIT

CLO1 QUESTION 7 What is Internet Service Provider (ISP) and list TWO (2) available ISP in Malaysia? SOALAN 7 Apakah Pembekal Perkhidmatan Internet (ISP) dan senaraikan DUA (2) ISP yang ada di Malaysia? QUESTION 8 Wireless systems are systems that do not use wires to send information but rather transmit it through the air. The growth of wireless systems creates several opportunities for hackers. Describe THREE (3) methods to avoid WLAN attacks. SOALAN 8 Sistem tanpa wayar adalah sistem yang tidak menggunakan wayar untuk menghantar maklumat, tetapi perpindahan maklumat berlaku melalui udara. Perkembangan sistem tanpa wayar membuka peluang kepada serangan penggodam Terangkan TIGA (3) cara untuk mengelakkan serangan terhadap WLAN. QUESTION 9 State THREE (3) of the most commonly used techniques of social engineering in network security? SOALAN 9 Nyatakan TIGA (3) teknik yang biasa digunakan dalam kejuruteraan sosial dalam keselamatan rangkaian 4 SULIT

QUESTION 10 List THREE (3) types of association and authentication problems in WLAN. SOALAN 10 Senaraikan TIGA (3) jenis masalah berkaitan sangkutan dan pengesahan dalam WLAN. SECTION C : 50 MARKS BAHAGIAN C : 50 MARKAH INSTRUCTION: This section consists of TWO (2) essay questions. Answer all questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan esei. Jawab semua soalan. QUESTION 1 SOALAN 1 (a) Your company has leased an internet connection from Internet Service Provider. Your boss asks you to setup a new company network. Given are the router, firewall, switch, four computers and one network printer. Syarikat anda telah menyewa satu talian internet daripada Penyedia Perkhidmatan Internet. Anda di arahkan untuk membangunkan rangkaian internet syarikat yang baru. Peralatan yang disediakan adalah router, firewall, switch, empat komputer dan satu pencetak rangkaian. i. Sketch your own small office network. Lakarkan rangkaian bagi pejabat anda. [5 marks] [5 markah] 5 SULIT

ii. Give THREE (3) differences between hub and switch. Berikan TIGA (3) perbezaan antara hub dan switch. [6 marks] [6 markah] (i) (i) (ii) (ii) Figure (b) Figure shows Open System Interconnection (OSI) Model. Gambarajah menujukkan Model Open System Interconnection (OSI). i. Describe the purpose of OSI Model. Terangkan tujuan OSI Model. [2 marks] [2 markah] ii. iii. Name the layer (i) and (ii), and state their specific function. Namakan lapisan di ruangan berlabel (i) dan (ii), dan terangkan fungsi lapisan tersebut [8 marks] [8 markah] Give TWO (2) examples of protocol involved in each layer below: Berikan DUA (2) contoh protocol yang terlibat bagi lapisan di bawah: a. Application Layer / Lapisan Aplikasi b. Transport Layer / Lapisan Pengangkutan [4 marks] [4 markah] 6 SULIT

QUESTION 2 SOALAN 2 a) Describe denial of service, brute force and phishing. Terangkan. denial of service, brute force and phishing. [12 marks] [12markah] There are other types of attacks which exploit the vulnerabilities in computer software. Examples of these attack techniques include: viruses, worms and Trojan horses. All of these are types of malicious software introduced onto a host. Terdapat pelbagai jenis serangan yang mengeksploitasi kelemahan yang terdapat dalam perisisan computer. Contohnya : virus,cecacing dan Trojan. Kesemua ini adalah perisian yang tidak baik yang diperkenalkan kepada pengguna. b) From the statement above, distinguish Viruses and Trojan Horse Dari pernyataan diatas, bezakan Viruses dan Trojan Horse [8 marks] [8 markah] c) Describe SPAM Terangkan SPAM [5 marks] [5 markah] SOALAN TAMAT 7 SULIT