Midterm Exam Review

advertisement
Midterm Exam Review
• Release questions via webcourse “assignment” around 2pm,
Monday Feb. 20th, due via webcourse at 2pm, next day
• Submit format:
– Word file, PDF file
– Scanned answer sheets
• Make sure your writing is large and readable, file names show page number
– Photos of your answer sheets if you have no scanner
• Make sure it is readable, file names show page number
• You can resubmit, so submit first version early!
– Don’t wait until the last one hour to submit!
– No excuse of not being able to submit! (unless webcourse is down for
the all day on Feb. 21st)
• From 2pm to 3:45pm on Monday, you can call me for any questions
related to exam problems
– Office number: 407-823-5015 (HEC 243)
Exam Coverage
• All questions in previous two homework
• All examples given in this review lecture
• Covers until buffer overflow attack and
defense lectures
• Try to go over my lecture notes
– Use textbook as reference
Question Types
– Knowledge questions
– True or false statement (explain why)
– Protocols
– Calculations
– All questions in Homework 1 and Homework 2
Knowledge Question Examples
• Difference between TCP and UDP?
• How many layers in computer networking?
• TCP packet header size? UDP packet header size? IP
packet header size?
• What service port used by DNS, HTTP, SMTP, SSH?
• TCP or UDP are normally used in which applications
(HTTP, SMTP, DNS, VOIP, etc)?
• What are the differences between public/symmetric key
cryptography? The advantage and disadvantage of each?
• What is RFID? Compared with bar code, what are its
advantages?
Knowledge Question Examples
• Ethernet switch checks what layer’s header? How about
routers?
• What are the several private IP blocks?
• What are the three security goals?
• Why most password-based login need at least 8
characters?
• What is message digest? Digital signature? What is
digital certificate?
• What does “rwx” represent in Unix file system? Folder?
• What are the two types of VM? Examples?
• What is “salt” used in OS password?
• What does subnet a.b.c.d/n mean?
Protocol Problem Examples
– TCP syn/ack number changes in a connection
• Homework 1
– TCP three-way connection setup procedure
• SYN, SYN/ACK, ACK and changes of seq/ack number
– Homework 1
– Two parties communication with certain security
requirements:
• Confidentiality, integrity/authentication
Calculation Problem Examples
• Cipher text computation:
– Caesar cipher, Vigenere cipher, Hill cipher
• Modular power computation
• Euclid’s GCD Algorithm
• Point out where is the vulnerability in a
given code
– buffer overflow, integer overflow, format string
Download