Old MIDTERM EXAM for 154

advertisement
CSUS
College of Engineering and Computer Science
Department of Computer Science
C Sc 196N Computer System Attacks and Countermeasures
SEMESTER: Fall 2005
Ghansah & Smith
EXAM #1
Multiple Choice (3 pts each, 15 pts total)
1. Which of the following is not a password-cracking
program?
a.
b.
c.
d.
e.
John the Ripper
Crack
Nmap
L0phtCrack
Both a and c
2. To encrypt a message to ensure secrecy using public key
cryptography, you need
a.
b.
c.
d.
the recipient’s private key
the recipient’s public key
your own pubic key
both a and b
3. To digitally sign a message you don’t intend to keep
secret using public key cryptography, you need
a.
b.
c.
d.
your own private key
your own public key
the recipient’s public key
both a and b
4. Which of the following ports is used in File and Printer
sharing in Microsoft networks?
a.
b.
c.
d.
e.
TCP Port 445
TCP port 139
UDP Port 53
TCP port 80
Both a and b
1
5. A message is said to be digitally signed if sent with
which of the following?
a.
b.
c.
d.
message
message
message
message
digest
digest encrypted with sender’s public key
digest encrypted with sender’s private key
and sender’s certificate
Short Answer/ Explain (10 pts each, 60 total)
6. What is scanning? What are the steps involved in
scanning?
7. nmap is a popular tool for scanning. It exploits the
fact that different TCP/IP Stack implementations (eg.
Windows, Linux, etc) do not behave exactly the same way
under certain circumstances. As a result nmap probes can be
used to predict operating systems. This is sometimes called
Stack Fingerprinting.
Give three examples of probes nmap can send to a machine
for stack finger printing purposes and explain why it
works.
2
8.a) What is buffer overflow?
b) Name three techniques to defend against buffer overflow
exploits.
9. Name four techniques to defend against password attacks.
10. a) What is a Denial of Service (DoS) attack?
b) What security policy is typically violated with a DoS
attack?
3
11. a) What is ARP Spoofing?
b) Explain how attacker’s exploit ARP Spoofing for their
purposes.
c) Explain how DNS Spoofing can be used to cause a Man In
The Middle (MITM) attack.
4
12. TRUE/FALSE (Circle T (True) or F (False)) (2 each, 10
total)
T F a. The first thing to do before you perform a scan for
the first time for your company is to ask permission.
T F b. The attacker’s process usually involves the
following sequence: Footprinting, covering tracks,
Scanning, Enumeration, compromise & privilege escalation
T F c. Law and Ethics are essentially the same.
T F d. In general, hacking is bad. There is no good reason
for doing any kind of hacking, including ‘ethical hacking’.
13. MATCHING. Match the following with the appropriate
numbers of data below. (3 each, 30 total)
a. __A program that appears to have a benign or useful
purpose but can hide a malicious capability.
b. __A tool for checking to see if Trojans/backdoors exist
on a system.
c. __California State law that deals with Unauthorized
access to computers, computer systems, and computer data.
d. __communication channel that can be exploited by a
process to transfer information in a manner that violates
the systems security policy.
e. __ A popular Trojan horse but which also has good uses.
f. __ A popular backdoor program but which also has good
uses.
g. __ A tool for listening to the network for data, then
gathering it for analysis.
h. __ A tool for injecting false information on the network
to support future listening and gathering of data for
analysis.
5
i. __ A buffer overflow attack can cause this to happen.
j. __ This is a sniffing countermeasure.
MATCHING DATA
1. backorifice 2000
2. encryption
3. Trojan horse
4. covert channel
5. tripwire
6. 520
7. dsniff
8. netcat
9. ethereal
10.runas
11.mkstrm
12.TCP
13.Unix
14.Denial of Service
6
Download