Exam 1 Solution

# Exam 1 Solution - CIS 3360 Security in Computing First...

This preview shows pages 1–4. Sign up to view the full content.

CIS 3360 – Security in Computing First Examination (100 points) February 15, 2010, Spring 2010 Name __________________________________ PID____________________ You can use a calculator. But you should show a few steps so that we can figure out what calculations you did. Cryptography Q1. [5] Indicate whether True or False: i) An access attack in which intruders position themselves at locations where information of interest is likely to pass by is known as snooping. (True / False ) ii) Security can be no stronger than its weakest link. ( True / False) iii) In Vernam Cipher, the key is 26 letters long. (True / False ) iv) Cryptography is the research into and study of encryption and decryption. ( True / False) v) Diffie-Hellman key exchange protocol does not require pre-shared public keys. ( True / False) Q2. [5] Choose the correct answer: i) One of the goals of security is to prevent denial of authorized access. This falls under: a) Confidentiality b) Integrity c) Availability Answer: c ii) If an unauthorized party not only accesses but tampers with the data, this falls under the following class of threats: a) Interruption b) Modification c) Fabrication Answer: b iii) In a Caesar Cipher system, if encryption is done by the rule ci = E(pi) = pi + 4, then y is encrypted as a) b b) c c) d Answer: b iv) When the encryption and decryption keys are the same, this form is known as a) Symmetric encryption b) Asymmetric encryption c) Simple encryption Answer: a

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
Q5. [5 + 5] Answer the following questions. Show your calculations: i) If the addresses range from 190.120.2.15 to 190.121.3.0, how many addresses does that range have? Answer:

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
This is the end of the preview. Sign up to access the rest of the document.

## This note was uploaded on 10/05/2010 for the course CIS CIS 3360 taught by Professor Guha during the Spring '10 term at University of Central Florida.

### Page1 / 8

Exam 1 Solution - CIS 3360 Security in Computing First...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document
Ask a homework question - tutors are online