FSC Sample Questions

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Question

In the context of (CIA), Critical analysis the security taxonomy and the implementation
principles. Elaborate on how CIA is used in an organizational context to ensure the Need-to-
know, Least privilege and Separation of duties from an organizational perspective. You may
use a Bank or Hospital organizational goal and security goal for your evaluation.
Q
Assess taxonomies of security such as authentication, Access control, Nonrepudiation and
Privacy implementation procedures ensure an organizational security requirement
Q
Critically analyse security from a functional view using the five distinct functional areas?

Question
Developed a secure network security risk strategy and measures required to be set up to carry
out the task of risk management? Use either ISO 27005 or ISO 131000 standard risk
management implementation procedures.

Q
Assess the relationship between threats, vulnerabilities, and risks of an organizational assets
and the countermeasures required in the event of a potential cyberattack? You may use a
diagram.

Questions 3 and 4 are Compulsory


Case Study: Problem of Public Key Authentication of Man in the Middle Attack
You are to use the case study to answer questions 3A and 3B

Question
In the context of password security, critically analyse the four general means of authenticating
a user’s identity from a sender and receiver perspective. Use case study and diagrams to explain
your concepts.

Question
Analyse how a man in the middle attack technique can be deployed on each of the following.
You may use a diagram to explain your techniques.
Password-based authentication (Hashed and Salt Value)
Certificate-based authentication (Public key Authentication)
SSL/TLS authentication (Client SSL, Server SSL, Certificate Authorities)

Question: A case study of using Phishing Attacks to Deliver Remote Access Malware
Use the case study to answer questions 4A to 4C.

Question
Analyse the Tactics, Techniques and Procedures (TTP) methods used by the cybercriminals for
threat intelligence gatherings to understand adversary behaviour and courses of action? You
may use an example of an attack such as using phishing malware to steal credit card credentials
to explain the TTP methods.

Q
With the aid of a diagram, implement the seven-stage Cyber Attack Lifecycle of the Kill chain
attack model. Use the case study of the phishing email for stealing credit cards credentials.

Q
Critically analyse the seven kill chain prevention mechanisms in line with cybersecurity
controls. Explain the techniques in your own words of how the model can be used to better
characterize and describe the post-compromise adversary behaviour and to prevent the attack
steps.

Q
With the aid of a diagram, implement the six processes using the techniques in digital forensics
investigations?
 Preservation, Identification, Transport, Acquisition /Extraction, Documentation of
digital evidence and Report Writing

Q
Assess why the following digital forensic investigations concepts are important to ensure that
digital evidence is admissible in court?
 Authentic, Accurate, Complete, and Convincing to juror
Q
A cyberattack incident occurred and the criminal was suspected to have used the computer to
have committed cybercrimes. The Internet history on the computer included a Google search
“how to hack into a system”
As a digital forensic investigator working as part of a cyber incident response team, use the
major approaches such as the system preservation phase, evidence searching phase and event
reconstruction phase to explain the investigation processes that are used to find evidence and
arrive at a conclusion?
You are to use the investigation techniques in the major phases of the incident response process
as follows.
A. Identify the type of crime scene to be investigated e.g., Dead or Life Analysis
B. Preserve Evidence
C. Acquisition Methods
D. Evidence Search methods
E. Analysis methods

Question
In the context of cyber security and digital forensics investigations, critically evaluate the roles
computers can play in a cybercrime analysis?

Q
In the context of cyberattacks and cyber threat intelligence gatherings, evaluate the attack
concepts using the “Method, Opportunity and Motive” (MOM) approach that is used by
cybercriminals to deploy cyberattacks.

Q
Digital Forensics Investigations guidelines require that we follow technical procedures such as
preservation, isolation, correlation, and logging (PICL) during the investigation process. Use
the PICL procedures and techniques to implement an investigation at a crime scene.

You might also like