Reference no: EM13187922
Question 1
Describe a malware attack that causes the victim to receive physical advertisement.
Question 2
Suppose that a metamorphic virus, DoomShift, is 99% useless bytes and 1% useful bytes. Unfortuntely, DoomShift has infected the Loginprogram on your Unix system and increased its seize from 54K bytes to 1054K bytes;hence, 1,000K bytes of login program now consists of the DoomShiftviruss. Barb has a cleanup program, DoomSweap, that is able to prune away the useless bytes of the Doomshift virus, so that in any infected file it will consist of 98% useless bytes and 2% useful bytes. If you apply DoomSweep to the infected login program, what will be its new size?
Question 3
Show how to defend against the DOS attack of Exercise C5-10.
You are the system administrator for an provider that owns a large network (eg. At least 64,000 IP addresses). Show how you can use SYN cookies to perform DOS attack on a web server.
Question 4
Describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.
Question 5
Suppose the transaction ID of DNS queries can take values from 1 to 65,536 and is randomly chosen for each DNS request. If an attacker sends 1,024 false replies per request, how many requests should he trigger to compromise the DNS cache of the victim with probability 99%?
Question 6
Describe a modification to the random port scan, as describe in previous exercise, so that it still use a randomly generated sequence of port numbers but will now have exactly the same number of attempted TCP connections as a sequential port scan.
Question 7
Describe a method for protecting users against URL obfuscation attacks.
Question 8
What is the plaintext for the following ciphertext, which was encrypted using a simple substation cipher:
CJBT COZ NPON ZJV FTTK TWRTUYTFGT NG DTN O XJL.Y COZ ZJV CPJVIK DTN O XJL MYUCN.
What is the dollar value of the total surplus
: ADVANCED ANALYSIS Assume the following values for Figures 5.4a and Figures 5.4b. Q1 = 20 bags. Q2 = 15 bags. Q3 = 27 bags. The market equilibrium price is $45 per bag. The price at a is $85 per bag. The price at c is $5 per bag. The price at f is ..
|
Show that the graph contains a monochromatic triangle
: A graph has six vertices, every two of which are joined by an edge. Each edge is colored red or white. Show that the graph contains a monochromatic triangle (a triangle all of whose vertices have the same color.) Is the result ttrue for a graph wi..
|
State the theoretical yield of isopentyl acetate
: Calculate the mass and volume of 150.0 mmol of isopentyl alcohol and the theoretical yield of isopentyl acetate
|
Aesthetical criterion in literature
: According to the textbook, mono no aware, the sensibility frequently found in the aristocratic literatures of Fujiwara era, derives from the Buddhist view that the material world is transitory. How does this view connect with an aesthetical criterion..
|
Describe a malware attack that causes the victim
: Describe a malware attack that causes the victim to receive physical advertisement and describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.
|
Determine the total revenue
: A firm has Total Costs (TC) of $12,000 over the next three months (TOTAL for the 3 months - not per month), of which $8,000 are fixed costs (TFC) for rent on its lease that cannot be broken. If it stays in business over those months, then the firm..
|
Define the density of the vinegar solution
: Assume the density of the vinegar solution is 1.00 g/mL and 3.5 % by mass acetic acid.
|
What is the projected net income
: Calculating Projected Net Income. A proposed new investment has projected sales of $825,000. Variable costs are 55 percent of sales, fixed costs are $187,150; depreciation is $91,000. Prepare a pro forma income statement assuming a tax rate of 35 ..
|
Benchmark study
: Suppose that the benchmark study actually requires 13 days as oppposed to the 10 days originally estimated. What actions would you take to keep the project on a normal schedule?
|