0% found this document useful (0 votes)
11 views13 pages

NWS information security setting 1

The document outlines the structure and content of the National Exam for Higher National Diploma in Information Security for the 2023 session in Cameroon. It includes multiple-choice questions (MCQs) and structural questions covering topics such as network security threats, access control, network segmentation, and cloud computing security challenges. The exam is divided into sections focusing on network security and administration, with specific instructions for candidates.

Uploaded by

noukeufortune54
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views13 pages

NWS information security setting 1

The document outlines the structure and content of the National Exam for Higher National Diploma in Information Security for the 2023 session in Cameroon. It includes multiple-choice questions (MCQs) and structural questions covering topics such as network security threats, access control, network segmentation, and cloud computing security challenges. The exam is divided into sections focusing on network security and administration, with specific instructions for candidates.

Uploaded by

noukeufortune54
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

REPUBLIQUE DU CAMEROUN REPUBLIC OF CAMEROON

Paix-Travail-Patrie Peace-Work-Fatherland
…………... …………...
MINISTERE DE L’ENSEIGNEMENT SUPERIEUR MINISTRY OF HIGHER EDUCATION
..………... …………...
COMMISSION NATIONALE D’ORGANISATION NATIONAL COMMISSION FOR THE ORGANISATION OF
DES EXAMENS THE EXAMS
…………….
NATIONAL EXAM OF HIGHER NATIONAL DIPLOMA – 2023 Session

Specialty/Option: NWS
Credit: 3
Paper: INFORMATION SECURITY

Instructions to candidates: You are required to answer all the questions in this paper

Section A: Network Security (50 marks)


PART I: This part is made up of MCQs and contributes for 10% of the entire paper. For each MCQs,
four (04) answers are proposed and only one is correct. (10 marks)

1. What are the OSI layers and their functions in networking?


A) Physical, Data Link, Network, Transport, Session, Presentation,
Application
B) Application, Presentation, Session, Transport, Network, Data Link,
Physical
C) Physical, Data Link, Network, Session, Transport, Presentation,
Application
D) Network, Data Link, Physical, Transport, Session, Presentation,
Application

2. What is the difference between confidentiality, integrity, and availability in


network security?
A) Confidentiality ensures that data is kept secret, integrity ensures that data
is not tampered with, and availability ensures that data can be accessed when
needed.
B) Confidentiality ensures that data is not tampered with, integrity ensures
that data is kept secret, and availability ensures that data can be accessed
when needed.
C) Confidentiality ensures that data is accessible when needed, integrity
ensures that data is kept secret, and availability ensures that data is not
tampered with.
D) Confidentiality ensures that data is kept secret, integrity ensures that data
can be accessed when needed, and availability ensures that data is not
tampered with.

3. What is the most common type of attack on networks?


A) Man-in-the-middle attack
B) Denial of Service attack
C) Phishing attack
D) Ransomware attack

4. How does SSL/TLS secure communication on the internet?


A) By encrypting the data being transmitted
B) By providing a secure login for the user
C) By creating a virtual private network
D) By creating a firewall around the network

5. What is the purpose of intrusion detection and prevention systems?


A) To monitor network traffic for signs of malicious activity and take action
to prevent it
B) To encrypt all data transmitted over the network
C) To create a virtual private network
D) To provide a secure login for the user

6. What is the goal of security protocols?


A) To encrypt all data transmitted over the network
B) To create a virtual private network
C) To provide a secure login for the user
D) To establish secure communication between two devices

7. What is a common type of organizational security issue?


A) Lack of employee security training
B) Lack of a disaster recovery plan
C) Use of outdated software
D) All of the above

8. What is the purpose of modeling network security and adversaries?


A) To understand the potential threats to a network and develop strategies to
defend against them
B) To encrypt all data transmitted over the network
C) To create a virtual private network
D) To provide a secure login for the user

9. What is the purpose of HTTP authentication?


A) To establish a secure login for the user
B) To encrypt all data transmitted over the network
C) To create a virtual private network
D) To prevent unauthorized access to a website

10.What is the purpose of XSS and CSRF exploits?


A) To steal sensitive information from a website's users
B) To disrupt the normal functioning of a website
C) To gain unauthorized access to a website
D) All of the above

11.What is the goal of securing broadcast systems?


A) To prevent unauthorized access to the broadcast
B) To prevent interference with the broadcast
C) To ensure the integrity of the broadcast
D) All of the above

12.What is the main function of a firewall in network security?


A) To monitor and control incoming and outgoing network traffic
B) To encrypt all data transmitted over the network
C) To create a virtual private network
D) To provide a secure login for the user

13.What is the difference between symmetric and asymmetric encryption?


A) Symmetric encryption uses one key for both encryption and decryption,
while asymmetric encryption uses two different keys.
B) Symmetric encryption uses two different keys, while asymmetric
encryption uses one key for both encryption and decryption.
C) Symmetric encryption uses one key for encryption and different key for
decryption, while asymmetric encryption uses two same key.
D) Symmetric encryption uses different key for encryption and decryption,
while asymmetric encryption uses one key for both encryption and
decryption.

14.What is a VPN?
A) A virtual private network that allows for secure communication over a
public network
B) A software that allows for remote access to a network
C) A firewall that protects a network from outside threats
D) A tool that encrypts all data transmitted over a network

15.What is the main function of an intrusion detection system (IDS)?


A) To prevent unauthorized access to a network
B) To monitor a network for signs of malicious activity and alert the
administrator
C) To encrypt all data transmitted over a network
D) To provide a secure login for the user

16.What is a common type of attack on web servers?


A) SQL injection
B) Man-in-the-middle attack
C) Phishing attack
D) Ransomware attack
17.What is the difference between a firewall and a router?
A) A firewall controls access to a network, while a router directs traffic
within a network
B) A firewall encrypts all data transmitted over a network, while a router
directs traffic within a network
C) A router controls access to a network, while a firewall directs traffic
within a network
D) A router encrypts all data transmitted over a network, while a firewall
controls access to a network

18.What is the purpose of a security incident response plan?


A) To have a pre-defined set of actions to take in the event of a security
incident
B) To encrypt all data transmitted over the network
C) To create a virtual private network
D) To provide a secure login for the user

19.What is the goal of securing internet infrastructure?


A) To protect the underlying systems that make up the internet from attack
B) To encrypt all data transmitted over the internet
C) To create a virtual private network over the internet
D) To provide a secure login for internet users

20.What is the main function of a proxy server in network security?

A) To act as a middleman between a user and the internet, providing an


additional layer of security
B) To encrypt all data transmitted over the network
C) To create a virtual private network
D) To provide a secure login for the user.
PART II: This part is made up of structural questions and contributes for 40% of the entire paper.
(40
marks)

Question 1. (10 marks)


a. What are some common types of network security threats? (2 marks)
b. How can network administrators identify and mitigate vulnerabilities in their
systems? (2 marks)
c. How can organizations protect their networks from data breaches and
unauthorized access? (2 marks)
d. How can organizations respond effectively to a security incident?
(2 marks)
e. How can organizations stay informed about the latest network security
threats and vulnerabilities? (2 marks)

Question 2 (10 marks)


a. What are some common methods of controlling access to a network?
(2 marks)
b. How can network administrators ensure that users are only able to access the
resources that they need? (2 marks)
c. How can organizations protect against unauthorized access from mobile
devices and remote workers? (2 marks)
d. How can organizations protect against insider threats? (2 marks)
e. How can organizations ensure compliance with industry-specific
regulations, such as HIPAA, PCI-DSS, and SOC2? (2 marks)

Question 3
a. What is network segmentation, and why is it important for network security?
b. How can organizations segment their networks, such as by using VLANs,
subnets, and firewalls?
c. How can network administrators monitor and manage traffic on segmented
networks, such as by using network monitoring tools and security
information and event management systems?
d. How can organizations protect critical assets, such as servers and databases,
through the use of security zones and micro-segmentation?
e. How can organizations ensure the integrity and availability of network
segmentation through regular testing, such as penetration testing and
vulnerability scanning?

Question 4
a. What are some of the unique security challenges associated with cloud
computing, such as multi-tenancy and shared responsibility?
b. How can organizations secure their cloud infrastructure, such as by using
cloud access security brokers and security groups?
c. How can organizations protect their data in the cloud, such as by encrypting
data at rest and in transit, and implementing data loss prevention?
d. How can organizations ensure compliance with regulations and industry
standards in the cloud, such as by using security-as-a-service offerings and
auditing cloud providers?
e. How can organizations ensure the availability and continuity of cloud-based
services, such as by implementing disaster recovery and business continuity
plans?

Section B: Network Administration (50 marks)


PART I: This part is made up of MCQs and contributes for 10% of the entire paper. For each
MCQs, four (04) answers are proposed and only one is correct. (10 marks)

1) Your company's network is experiencing slow performance and frequent


outages. What should you check first to diagnose the problem?
a) The network's firewall settings
b) The network's switch configuration
c) The network's router configuration
d) The network's cable connections

2) An employee reports that they are unable to access a specific website. What
is the first step in troubleshooting this issue?
a) Check the employee's computer for malware
b) Check the website's server status
c) Check the employee's network connection
d) Check the company's internet connection

3) Your company is concerned about security threats to its network. What


should you implement to enhance network security?
a) Anti-virus software on all computers
b) Firewall with strict incoming and outgoing rules
c) Virtual Private Network (VPN) for remote workers
d) All of the above

4) A user is reporting poor call quality on their VoIP phone. What should
you check to troubleshoot this issue?
a) The phone's firmware version
b) The phone's network settings
c) The phone's power source
d) The network's bandwidth availability

5) Your company has recently acquired a new branch office. What is the
first step in integrating the branch office's network into the company's
network?
a) Configuring a VPN connection between the branch office and the
company's main office
b) Installing a new router at the branch office
c) Updating the branch office's network hardware to match the company's
main office
d) Assessing the branch office's current network infrastructure

6) An employee reports that they are unable to access their email. What
should you check to troubleshoot this issue?
a) The employee's internet connection
b) The employee's email client settings
c) The email server's status
d) All of the above

7) You need to increase the capacity of your company's network. What


should you implement to achieve this?
a) Upgrade the network's routers and switches
b) Add additional network cables
c) Increase the number of access points
d) All of the above

8) Your company's network has been experiencing a high number of


network outages. What should you check to diagnose the problem?
a) The network's cable connections
b) The network's power source
c) The network's cooling system
d) The network's hardware components

9) An employee reports that they are unable to connect to the company's


network wirelessly. What should you check to troubleshoot this issue?
a) The employee's wireless network settings
b) The employee's computer's wireless network adapter
c) The access point's wireless network settings
d) All of the above

10) Your company is planning to allow remote workers to access the


company's network. What should you implement to enable secure remote
access?
a) Virtual Private Network (VPN)
b) Remote Desktop Protocol (RDP)
c) Secure Shell (SSH)
d) All of the above

11) You need to update the DNS settings on a Windows Server. What tool
should you use to accomplish this task?
a) Control Panel
b) DNS Manager
c) Group Policy Editor
d) Event Viewer

12) Your Windows Server is running low on disk space. What should you
do to free up space?
a) Disable system restore
b) Delete unnecessary files and programs
c) Defragment the hard drive
d) All of the above
13) Your Windows Server is experiencing performance issues. What
should you check to diagnose the problem?
a) CPU usage
b) Memory usage
c) Disk I/O
d) All of the above

14) You need to set up a new user account on a Windows Server. What
tool should you use to accomplish this task?
a) Control Panel
b) Computer Management
c) Local Security Policy
d) Active Directory Users and Computers

15) Your Windows Server is running out of memory. What should you do
to fix the issue?
a) Add more RAM to the server
b) Increase the pagefile size
c) Disable unnecessary services and programs
d) All of the above

16) You need to configure a Windows Server to automatically backup


data. What tool should you use to accomplish this task?
a) Task Scheduler
b) Backup and Restore
c) File History
d) System Restore

17) You need to configure a Windows Server for remote access. What tool
should you use to accomplish this task?
a) Remote Desktop
b) Remote Assistance
c) Remote Access
d) Terminal Services

18) Your Windows Server's event logs are full. What should you do to fix
the issue?
a) Delete old event logs
b) Increase the maximum size of the event log
c) Disable event logging
d) All of the above

19) You need to install a new software on a Windows Server. What should
you do to ensure the software is compatible with the server?
a) Check the software's system requirements
b) Test the software on a non-production server
c) Run the software in compatibility mode
d) All of the above

20) You need to restore a Windows Server to a previous state. What tool
should you use to accomplish this task?
a) Control Panel
b) System Restore
c) Backup and Restore
d) Event Viewer
PART II: This part is made up of structural questions and contributes for 40% of the entire paper.
(40
marks)

1. How would you troubleshoot and resolve a network connectivity issue


between multiple branches in a company's WAN? (2 marks)
a. What tools and methods would you use to identify the cause of the
connectivity issue? (2 marks)
b. How would you troubleshoot and isolate the issue within the WAN?
(1 marks)
c. How would you verify that the issue is not with the routing configuration
on the branch routers? (2 marks)
d. How would you verify that the issue is not with the WAN link itself?
(1 marks)
e. How would you implement a solution to the issue, and test to ensure that
it is resolved? (2 marks)

2. What steps would you take to secure a company's network infrastructure


against external cyber threats? (2 marks)
a. How would you identify vulnerabilities in the network infrastructure?
(1 marks)
b. How would you implement firewalls and intrusion detection/prevention
systems to protect against external threats? (2 marks)
c. How would you ensure that all network devices are configured securely, and
that any unnecessary services or ports are disabled? (1 marks)
d. How would you implement a strong authentication and access control
system to prevent unauthorized access to the network? (2 marks)
e. How would you monitor the network for security events and respond to any
incidents? (2 marks)

3. How would you perform a clean installation of Windows Server on a new


hardware server? (2 marks)
a. What hardware and software requirements would you verify before
beginning the installation process? (2 marks)
b. How would you prepare the new server's hardware for the installation of
Windows Server? (1 marks)
c. How would you boot the server into the Windows Server installation media
and begin the installation process? (1 marks)
d. How would you configure the server's basic settings, such as the
administrator password, network settings, and time zone?
(2 marks)
e. How would you verify that the installation was successful and that the server
is functioning as expected? (2 marks)

4. How would you resolve a situation where a Windows Server's performance is


slow and the event logs show high CPU and memory usage?
(2 marks)
a. How would you identify the cause of the performance issue using the event
logs and other monitoring tools? (1 marks)
b. How would you troubleshoot and resolve any issues related to high CPU and
memory usage? (2 marks)
c. How would you verify that there are no issues with disk I/O or network
performance? (1 marks)
d. How would you identify and troubleshoot any issues related to the server's
configuration or installed services? (2 marks)
e. How would you implement any necessary changes to resolve the
performance issue and prevent it from recurring in the future? (2 marks)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy