August
1999 QUESTION 1 (Compulsory) Total Marks: 20 Marks |
Click here to access other
questions
Click to access |
| (a) | Explain the characteristics of computer
intrusion.
|
[2] |
| (b) | Explain briefly the purpose of a public key
protocol.
|
[2] |
| (c) | Identify any two major goals of legal issues
in computer security.
|
[2] |
| (d) | Name the two basic methods by which a system
can provide security.
|
[2] |
| (e) | Identify and explain any two categories of
vulnerabilities in PC security.
|
[4] |
| (f) | List three advantages and one disadvantage of
conducting a disaster simulation.
|
[4] |
| (g) | List and explain the different forms of
non-repudiation services provided in networks.
|
[4] |