Reference no: EM132367699
Question 1
1. What is the OSI security architecture?
2. What is the difference between passive and active security threats?
3. List and briefly define categories of passive and active security attacks.
4. List and briefly define categories of security services.
5. List and briefly define categories of security mechanisms.
6. List and briefly define the fundamental security design principles.
7. Explain the difference between an attack surface and an attack tree.
Question 2
1. What are the essential ingredients of a symmetric cipher?
2. What are the two basic functions used in encryption algorithms?
3. How many keys are required for two people to communicate via a symmetric cipher?
4. What is the difference between a block cipher and a stream cipher?
5. What are the two general approaches to attacking a cipher?
6. Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
7. What is triple encryption?
8. Why is the middle portion of 3DES a decryption rather than an encryption?
Question 3
1. List three approaches to message authentication.
2. What is a message authentication code?
4. What properties must a hash function have to be useful for message authentication?
5. In the context of a hash function, what is a compression function?
6. What are the principal ingredients of a public-key cryptosystem?
7. List and briefly define three uses of a public-key cryptosystem.
8. What is the difference between a private key and a secret key?
9. What is a digital signature?
Question 4
1. List ways in which secret keys can be distributed to two communicating parties.
2. What is the difference between a session key and a master key?
3. What is a key distribution center?
4. What entities constitute a full-service Kerberos environment?
5. In the context of Kerberos, what is a realm?
6. What are the principal differences between version 4 and version 5 of Kerberos?
7. What is a nonce?
8. What are two different uses of public-key cryptography related to key distribution?
9. What are the essential ingredients of a public-key directory?
10. What is a public-key certificate?
11. What are the requirements for the use of a public-key certificate scheme?
12. What is the purpose of the X.509 standard?
13. What is a chain of certificates?
14. How is an X.509 certificate revoked?
Question 5:
1. Provide a brief definition of network access control.
2. What is an EAP?
3. List and briefly define four EAP authentication methods.
4. What is EAPOL?
5. What is the function of IEEE 802.1X?
6. Define cloud computing.
7. List and briefly define three cloud service models.
8. What is the cloud computing reference architecture?
9. Describe some of the main cloud-specific security threats.
Question 6:
1. What protocols comprise TLS?
2. What is the difference between a TLS connection and a TLS session?
3. List and briefly define the parameters that define a TLS session state.
4. List and briefly define the parameters that define a TLS session connection.
5. What services are provided by the TLS Record Protocol?
6. What steps are involved in the TLS Record Protocol transmission?
7. What is the purpose of HTTPS?
8. For what applications is SSH useful?
9. List and briefly define the SSH protocols.
Question 7
1. What is the basic building block of an 802.11 WLAN?
2. Define an extended service set.
3. List and briefly define IEEE 802.11 services.
4. Is a distribution system a wireless network?
5. How is the concept of an association related to that of mobility?
6. What security areas are addressed by IEEE 802.11i?
7. Briefly describe the five IEEE 802.11i phases of operation.
8. What is the difference between TKIP and CCMP?
Question 8:
1. What is the difference between RFC 5321 and RFC 5322?
2. What are the SMTP and MIME standards?
3. What is the difference between a MIME content type and a MIME transfer encoding?
4. Briefly explain base64 encoding.
5. Why is base64 conversion useful for an e-mail application?
6. What is S/MIME?
7 What are the four principal services provided by S/MIME?
8. What is the utility of a detached signature?
9. What is DKIM?
Question 9:
1. Give examples of applications of IPsec.
2. What services are provided by IPsec?
3. What parameters identify an SA and what parameters characterize the nature of a particular SA?
4. What is the difference between transport mode and tunnel mode?
5. What is a replay attack?
6 .Why does ESP include a padding field?
7. What are the basic approaches to bundling SAs?
8. What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?
Question 10:
1. What are three broad mechanisms that malware can use to propagate?
2. What are four broad categories of payloads that malware may carry?
3. What are typical phases of operation of a virus or worm?
4. What mechanisms can a virus use to conceal itself?
5. What is the difference between machine-executable and macro viruses?
6. What means can a worm use to access remote systems to propagate?
7. What is a "drive-by-download" and how does it differ from a worm?
8 What is a "logic bomb"?
9. Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
10. List some of the different levels in a system that a rootkit may use.
11. Describe some malware countermeasure elements.
12. List three places malware mitigation mechanisms may be located.
13. Briefly describe the four generations of antivirus software.
14. How does behavior-blocking software work?
15. What is a distributed denial-of-service system?
Question 11:
1. List and briefly define three classes of intruders.
2. What are two common techniques used to protect a password file?
3. What are three benefits that can be provided by an intrusion detection system?
4. What is the difference between statistical anomaly detection and rule-based intrusion detection?
5. What metrics are useful for profile-based intrusion detection?
6. What is the difference between rule-based anomaly detection and rule-based penetration identification?
7. What is a honeypot?
8. What is a salt in the context of UNIX password management?
9 .List and briefly define four techniques used to avoid guessable passwords.
Question 12:
1. List three design goals for a firewall.
2. List four techniques used by firewalls to control access and enforce a security policy.
3. What information is used by a typical packet filtering firewall?
4. What are some weaknesses of a packet filtering firewall?
5. What is the difference between a packet filtering firewall and a stateful inspection firewall?
6. What is an application-level gateway?
7. What is a circuit-level gateway?
9. What are the common characteristics of a bastion host?
10. Why is it useful to have host-based firewalls?
11. What is a DMZ network and what types of systems would you expect to find on such networks?
12. What is the difference between an internal and an external firewall?