Exam 1 Solution - CIS 3360 Security in Computing First...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
CIS 3360 – Security in Computing First Examination (100 points) February 15, 2010, Spring 2010 Name __________________________________ PID____________________ You can use a calculator. But you should show a few steps so that we can figure out what calculations you did. Cryptography Q1. [5] Indicate whether True or False: i) An access attack in which intruders position themselves at locations where information of interest is likely to pass by is known as snooping. (True / False ) ii) Security can be no stronger than its weakest link. ( True / False) iii) In Vernam Cipher, the key is 26 letters long. (True / False ) iv) Cryptography is the research into and study of encryption and decryption. ( True / False) v) Diffie-Hellman key exchange protocol does not require pre-shared public keys. ( True / False) Q2. [5] Choose the correct answer: i) One of the goals of security is to prevent denial of authorized access. This falls under: a) Confidentiality b) Integrity c) Availability Answer: c ii) If an unauthorized party not only accesses but tampers with the data, this falls under the following class of threats: a) Interruption b) Modification c) Fabrication Answer: b iii) In a Caesar Cipher system, if encryption is done by the rule ci = E(pi) = pi + 4, then y is encrypted as a) b b) c c) d Answer: b iv) When the encryption and decryption keys are the same, this form is known as a) Symmetric encryption b) Asymmetric encryption c) Simple encryption Answer: a
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
v) Euler Totient Function is used in this public key encryption method to develop keys a) Diffie-Hellman b) RSA c) Elliptic Curve Answer: b Network Q3. [5] Indicate whether True or False: i) TCP/IP is a reliable service. ( True / False) ii) UDP lies at the network layer of the Internet Protocol Stack. (True / False ) iii) Class A addresses end at 128.0.0.0. (True / False ) iv) Eleven bits are needed for 2500 addresses. (True / False ) v) In the range 192.168.12.15 to 192.168.12.200, there are 185 addresses. (True / False ) Q4. [5] Choose the correct answer: i) A number that designates a particular application running on a computer is: a) An IP address b) A MAC address c) A Port Answer: c ii) In TCP/IP protocol stack, the following layer transmits packets in datagrams: a) Transport layer b) Internet layer c) Physical layer Answer: b iii) UDP stands for a) Usage Dataservice Protocol b) User Data Protocol c) User Datagram Protocol Answer: c iv) The hexadecimal address CF 9D 23 6E in octal is: a) 317.235.43.156 b) 417.235.23.155 c) 318.235.23.156 Answer: a v) In CIDR, the IP address with a subnet mask 223.47.20.0/23 can be a a) Subnet with 4000 hosts b) Subnet with 500 hosts c) Subnet with 515 hosts Answer: b
Background image of page 2
Q5. [5 + 5] Answer the following questions. Show your calculations: i) If the addresses range from 190.120.2.15 to 190.121.3.0, how many addresses does that range have? Answer:
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/05/2010 for the course CIS CIS 3360 taught by Professor Guha during the Spring '10 term at University of Central Florida.

Page1 / 8

Exam 1 Solution - CIS 3360 Security in Computing First...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online