August
1999 QUESTION 1 (Compulsory) Total Marks: 20 Marks |
Click here to access other
questions
Click to access |
(a) | Explain the characteristics of computer
intrusion.
|
[2] |
(b) | Explain briefly the purpose of a public key
protocol.
|
[2] |
(c) | Identify any two major goals of legal issues
in computer security.
|
[2] |
(d) | Name the two basic methods by which a system
can provide security.
|
[2] |
(e) | Identify and explain any two categories of
vulnerabilities in PC security.
|
[4] |
(f) | List three advantages and one disadvantage of
conducting a disaster simulation.
|
[4] |
(g) | List and explain the different forms of
non-repudiation services provided in networks.
|
[4] |