Network Security sample final exam

advertisement
Philadelphia University
Faculty Of Administrative & Financial Sciences
Business Networking and Systems Management Department
Network Security & Firewalls Fundamentals
0371410
Sample Final Exam - First Semester 2010/2011
Student Name:
Student Number:
Section:
Pages:
Course instructors
Course coordinator
Internal Examiner
6/6
Ahmad Al-Ghoul
Student information:
1- This exam contains 3 major questions.
2- The student must have all his instruments required for this exam.
3- Each question mark written beside the question
Q.1. Answer with True or False
1-Integrity mean assets can be modified only by authorized parties or only in authorized
ways._______
2-Confidentiality mean assets are accessible to unauthorized parties._________
3-Interception: means –an unauthorized party not only accesses but tampers with an asset.
________
4-Fabrication: authorized party fabricates counterfeit objects on a computing system.
_____________
5-virus: a specific type of Trojan horse that can be used to spread infection from one computer
to anther._______
6-operating system controls: limitations enforced by the user to protect each user from all other
users.__________
7–development controls: quality standards under which a program is designed, coded, tested,
and maintained.________
8-enciphering: the process of translating entire words or phrases to other words or
phrases.________
9-encryption: the group term that covers both encoding and enciphering.___________
10- Digital signature is a sort of protocol that provides authenticity
and identification of the user _________
11- Different operating systems have different ACL terms ________
12- Cryptanalysis Means code making. __________
)1(
13- Security depends on the secrecy of the algorithm, not the secrecy of the key. _________
14- Key Size: smaller key size means greater security. _________
15-Hash Functions A hash function is a one way function that maps values from a large
domain into a comparatively small range known as a digest. ___________
16- Symmetric Cryptosystem: KE = KD. __________
17- Authentication being able to determine and allow the user only those resources the user has
ability to utilize. _________
18- Authorization : To prove positively that the user is what he/she claims to be.
19 –Confidentiality – the assets of a computing system are accessible only by authorized
parties. ___________
20- Masquerade – one entity pretends to be a different entity. ______
21- Denial of service: Means passive capture of information and its retransmission.
__________
22- In a two- computer communication, both computers must follow the same protocol in order
for either to participate. ___________
23–protocols separate the process of accomplishing a task from the mechanism by which it is
done. _________
24- A protocol specifies only the rules of behavior . ____________
25-In Protocol we cant change the implementation without affecting the design. _______
26- Adjudicated causes a time delay in communication because a third party must receive, act
on, and then forward every transaction. __________
27- Key Size: larger key size means greater security. ___________
28- Secrecy becomes vulnerable, because the arbiter has access to much sensitive information.
___________
29- Adjudicated protocols detect a failure to cooperate after the failure has occurred. ________
30- The less cipher text the cryptanalyst has to work with, the greater the likelihood of a
success. _________________
31- Public key certificate is the digital signature on the identities and its public key by CA.
_______________
32- Theoretically, it is impossible to devise unbreakable cryptosystems. _______
)2(
33 –Speed of Encryption block symmetric > stream symmetric > asymmetric. ________
34- Number of rounds: multiple rounds offer dcreasing security. __________________
35 –A protocol is an orderly sequence of steps two or more parties take to accomplish some
task. ________
36- One-way encryption, allows for the encryption of some plain text, but does not provide a
way in which to convert the cipher text back to its original form. _________
37-Resident viruses - Locates itself in CPU so that it can remain active even after its attached
program ends. ________
38- Logic Bomb - A class of malicious code that detonates when a specified condition occurs
_______
39- Integrated Viruses : Virus code runs the original program but has control before and after
its execution. ___________
40-Boot Sector Viruses gains control very early in the boot process before most detection tools
are active. ______________
41- Virus signatures are used by virus scanners to detect the virus ___________
42- Viruses can’t infect hardware. _________
43- Password authentication assumes that anyone who knows the password is the user to whom
the password belongs. ________
Q.2. Circle the correct answer for each problem:
1-Interruption affects
A- availability
B- integrity
C- authenticity
D- none of the above
2-Error detection and correction is one of the aspects of
A- availability
B- integrity
C- authenticity
D- none of the above
3-Trojan horse is.
A- a program that has a secret entry point.
B- program that does one thing while covertly doing anther.
C- A Hardware.
D- All of the above.
)3(
4-
the above graph represent the.
A- Asymmetric Cryptosystem
B- symmetric Cryptosystem
C- Hash function
D- Web Access with SSL
5- the most important resource security try to protect is.
A- Equipment.
B- –Systems
C- Data and Information
D- All of the above
6- Threat Means
A- measure of the possibility of security breaches and severity of the damage
B- potential occurrence that can have an undesired effect on the system
C- action of malicious intruder that exploits vulnerabilities of the system to
cause a
threat to occur
D- None of the above
7- Modification: Means.
A- unauthorized party fabricate counterfeit objects on a computing system
B- An asset of the system becomes lost, unavailable, or unusable.
C- an unauthorized party not only accesses but tampers with an asset
D- Some unauthorized party has gained access to an asset
8-In a computer protocol arbiter is a trustworthy third party who ensures
A- Fairness.
B- Truth.
C- Data.
D- People.
9- To prevent reusable in symmetric key digital signature you can use .
A-chain cipher.
B- format cipher
B- time stamp.
C- Post stamp.
10- Practical cryptosystems almost always are breakable given adequate
A- Time.
B- Computing power.
C- bounded waiting time.
D- A & B
)4(
11- Low error propagation is one of the advantages of.
A- asymmetric
B- Block Ciphers
C- Stream Ciphers
D- none of the above.
12- in Substitution ciphers.
A- The order of plaintext letters is rearranged during encryption
B- Letters of the plaintext messages are replaced with other letters during the encryption
C- none of the above
D- A & B
13- Confusion means.
A- Ciphertext size should not be larger than plaintext
B- Change in the plaintext should affect many parts of the ciphertext
C- The change in ciphertext triggered by an alteration in the plaintext should be unpredictable
D- A & B
14- If the one-way encrypted passwords somehow fall into the hands of a third-party
A- it can decrypt the password by reversing back the one way encryption to obtain the
passwords
B- it can get the passwords from the file they have
C- The change in ciphertext triggered by an alteration in the plaintext should be unpredictable
D- it isn't going to do much good because they can never be converted back to plain text.
15- Substitution ciphers.
A- The order of plaintext letters is rearranged during encryption.
B- Letters of the plaintext messages are replaced with other letters during the encryption.
C- A & B.
D- None of the above.
16- Transient Viruses
A- Locates itself in memory so that it can remain active even after its attached program ends
B- –Runs when its attached program executes and terminates when its attached program ends
C- A & B
D- none of the above
17- Virus attaches itself to memory resident code.
A- Virus gains control very early in the boot process before most detection tools are active.
B- Virus is activated many times while the machine is running
C- Virus embeds itself in data files
D- None of the above.
Q.3. for each of the following problems, discuss each briefly.
)5(
1)suppose one party, say Allice want to send a message to second party say Bob write the
steps needs to encrypt this massage and sign it with Allice digital signature using public key
Cryptographic System and hash function.
2) Distinguish between Threat, Risk, Attack
3) There are four factors that affect the effectiveness of controls. write them and discuss how
they affect the control.
4) Discuss the three software security tools attempt to prevent exploitation of the
vulnerabilities of computing system.
5) Describe the threats to Software
6) write down the steps for a protocol to solve the problem of exchanging key with
Symmetric Key with Server.
7) Discuss the four Characteristics for a good Protocol.
8) Discuss the three kinds of Protocols, the main points to discuss are
- the way they use
- advantages
- disadvantages
9) write down the steps for a protocol to solve the problem of exchanging key with
Asymmetric Key with Server.
10) Discuss the four primary and desirable conditions for a digital signature .
11) write down the steps for a protocol to solve the problem of digital signature for
symmetric key without encryption.
12) discus the advantages and disadvantages of Arbitrated Protocols
13) Distinguish between, Worm, Trojan Horse, Trapdoor and Logic bomb.
14) Discuss the four methods viruses applied to attach.
15) Write down the stepes to Prevent Virus Infection in your system.
16) Discuss the process CHAP used to authenticate the user.( 5 marks )
17) PAP provides a simple method for the peer to establish its identity using a 2-way
handshake. describe the 2 way handshake for PAP.( 3 marks )
18) RADIUS can be implement in two scenario discuss the two scenarios and the differences
between them ( 3 marks)
19) IPsec has two types discuss the differences between those two types. (3 marks)
)6(
With all my best wishes
)7(
Download