December
1998 QUESTION 1 (Compulsory) Total Marks: 20 Marks |
Click here to access other
questions
SUGGESTED SOLUTIONS
|
(a) | Describe two common methods for preventing attacks on computers, and in each case give one disadvantage of the approach. | [6] |
One mark should be
awarded for each valid point, a further mark should be awarded for each satisfactory
elaboration, and one mark should be awarded for a suitable disadvantage (up to a maximum
of six marks). Examples include the following:
Other sensible answers should also receive credit.
|
||
(b) | List three security-related functions which are performed by an operating system. | [3] |
One mark
should be awarded for each valid point. Examples include the following:
Other sensible answers should also receive credit.
|
||
(c) | Give one example of each of the following types of attack: | [3] |
One mark should be awarded for each valid example. Examples include the following: | ||
(i) Pest programs. | ||
An example
of a pest program is a Trojan horse attack.
|
||
(ii) External masquerading. | ||
An individual tapping
into a communications medium, recording the information which is being transferred, and
then playing back the information at a later date.
|
||
(iii) External information theft. | ||
An
individual glancing at a colleagues terminal to gain access to information to which
they are not entitled. Other sensible answers should also receive credit.
|
||
(d) | Describe two benefits associated with careful risk analysis. | [4] |
One mark
should be awarded for each valid point, a further mark should be awarded for each
satisfactory elaboration (up to a maximum of four marks). Examples include the following:
Other sensible answers should also receive credit.
|
||
(e) | Describe two approaches to minimising disaster risk. | [4] |
One mark
should be awarded for each valid point, a further mark should be awarded for each
satisfactory elaboration (up to a maximum of four marks). Examples include the following:
Other sensible answers should also receive credit. |