Technical University of Mombasa
CIT 4209 Computer systems security Study
Guide / Revision Questions Question 1
a) Differentiate between “Risk Assessment” and “Risk Management”
b) Explain four major areas addressed during risk assessment.
c) Describe the major risk handling strategies
d) Explain the following cyber threats
i. Bots and Botnets
ii. Cryptomining
iii. Drive-By Exploit and Watering Hole
iv. Script kiddie
v. Adware
vi. Code injection
vii. Denial of service
viii. Man-in-the-middle
ix. Password cracking
x. Spoofing
Question 2
a) Explain the following terms:
i) Cybersecurity incident
ii) Incident Response”
iii) Hot site facilities:
iv) Cold site facilities
b) Hence describe the six stages of incident response
c) Outline any four Incident Categories as identified by National Institute of Standards and
Technology (NIST)
Question 3
a) i) Explain any five Typical mobile security issues
ii) Explain any five Consequences of a Mobile Attack Can Be Severe
iii) Explain the steps to take to protect your mobile phone
b) i) Explain the term “cloud computing”
ii) Explain five characteristics of cloud computing
TUM is ISO 9001:2015 Certified
1