What are the essential ingredients of symmetric cipher

Assignment Help Basic Computer Science
Reference no: EM132367699

Question 1

1. What is the OSI security architecture?

2. What is the difference between passive and active security threats?

3. List and briefly define categories of passive and active security attacks.

4. List and briefly define categories of security services.

5. List and briefly define categories of security mechanisms.

6. List and briefly define the fundamental security design principles.

7. Explain the difference between an attack surface and an attack tree.

Question 2

1. What are the essential ingredients of a symmetric cipher?

2. What are the two basic functions used in encryption algorithms?

3. How many keys are required for two people to communicate via a symmetric cipher?

4. What is the difference between a block cipher and a stream cipher?

5. What are the two general approaches to attacking a cipher?

6. Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?

7. What is triple encryption?

8. Why is the middle portion of 3DES a decryption rather than an encryption?

Question 3

1. List three approaches to message authentication.

2. What is a message authentication code?

4. What properties must a hash function have to be useful for message authentication?

5. In the context of a hash function, what is a compression function?

6. What are the principal ingredients of a public-key cryptosystem?

7. List and briefly define three uses of a public-key cryptosystem.

8. What is the difference between a private key and a secret key?

9. What is a digital signature?

Question 4

1. List ways in which secret keys can be distributed to two communicating parties.

2. What is the difference between a session key and a master key?

3. What is a key distribution center?

4. What entities constitute a full-service Kerberos environment?

5. In the context of Kerberos, what is a realm?

6. What are the principal differences between version 4 and version 5 of Kerberos?

7. What is a nonce?

8. What are two different uses of public-key cryptography related to key distribution?

9. What are the essential ingredients of a public-key directory?

10. What is a public-key certificate?

11. What are the requirements for the use of a public-key certificate scheme?

12. What is the purpose of the X.509 standard?

13. What is a chain of certificates?

14. How is an X.509 certificate revoked?

Question 5:

1. Provide a brief definition of network access control.

2. What is an EAP?

3. List and briefly define four EAP authentication methods.

4. What is EAPOL?

5. What is the function of IEEE 802.1X?

6. Define cloud computing.

7. List and briefly define three cloud service models.

8. What is the cloud computing reference architecture?

9. Describe some of the main cloud-specific security threats.

Question 6:

1. What protocols comprise TLS?

2. What is the difference between a TLS connection and a TLS session?

3. List and briefly define the parameters that define a TLS session state.

4. List and briefly define the parameters that define a TLS session connection.

5. What services are provided by the TLS Record Protocol?

6. What steps are involved in the TLS Record Protocol transmission?

7. What is the purpose of HTTPS?

8. For what applications is SSH useful?

9. List and briefly define the SSH protocols.

Question 7

1. What is the basic building block of an 802.11 WLAN?

2. Define an extended service set.

3. List and briefly define IEEE 802.11 services.

4. Is a distribution system a wireless network?

5. How is the concept of an association related to that of mobility?

6. What security areas are addressed by IEEE 802.11i?

7. Briefly describe the five IEEE 802.11i phases of operation.

8. What is the difference between TKIP and CCMP?

Question 8:

1. What is the difference between RFC 5321 and RFC 5322?

2. What are the SMTP and MIME standards?

3. What is the difference between a MIME content type and a MIME transfer encoding?

4. Briefly explain base64 encoding.

5. Why is base64 conversion useful for an e-mail application?

6. What is S/MIME?

7 What are the four principal services provided by S/MIME?

8. What is the utility of a detached signature?

9. What is DKIM?

Question 9:

1. Give examples of applications of IPsec.

2. What services are provided by IPsec?

3. What parameters identify an SA and what parameters characterize the nature of a particular SA?

4. What is the difference between transport mode and tunnel mode?

5. What is a replay attack?

6 .Why does ESP include a padding field?

7. What are the basic approaches to bundling SAs?

8. What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Question 10:

1. What are three broad mechanisms that malware can use to propagate?

2. What are four broad categories of payloads that malware may carry?

3. What are typical phases of operation of a virus or worm?

4. What mechanisms can a virus use to conceal itself?

5. What is the difference between machine-executable and macro viruses?

6. What means can a worm use to access remote systems to propagate?

7. What is a "drive-by-download" and how does it differ from a worm?

8 What is a "logic bomb"?

9. Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?

10. List some of the different levels in a system that a rootkit may use.

11. Describe some malware countermeasure elements.

12. List three places malware mitigation mechanisms may be located.

13. Briefly describe the four generations of antivirus software.

14. How does behavior-blocking software work?

15. What is a distributed denial-of-service system?

Question 11:

1. List and briefly define three classes of intruders.

2. What are two common techniques used to protect a password file?

3. What are three benefits that can be provided by an intrusion detection system?

4. What is the difference between statistical anomaly detection and rule-based intrusion detection?

5. What metrics are useful for profile-based intrusion detection?

6. What is the difference between rule-based anomaly detection and rule-based penetration identification?

7. What is a honeypot?

8. What is a salt in the context of UNIX password management?

9 .List and briefly define four techniques used to avoid guessable passwords.

Question 12:

1. List three design goals for a firewall.

2. List four techniques used by firewalls to control access and enforce a security policy.

3. What information is used by a typical packet filtering firewall?

4. What are some weaknesses of a packet filtering firewall?

5. What is the difference between a packet filtering firewall and a stateful inspection firewall?

6. What is an application-level gateway?

7. What is a circuit-level gateway?

9. What are the common characteristics of a bastion host?

10. Why is it useful to have host-based firewalls?

11. What is a DMZ network and what types of systems would you expect to find on such networks?

12. What is the difference between an internal and an external firewall?

Reference no: EM132367699

Questions Cloud

Why did nationwide need an enterprise-wide data warehouse : Why did Nationwide need an enterprise-wide data warehouse? How did integrated data drive the business value? What forms of analytics are employed at Nationwide?
Calculate and return the lowest high temperature : Write methods to calculate and return the lowest high temperature (minimum) and a method to calculate and return highest high temperature (maximum) in array
Discuss the major social structure theories : Discuss the major social structure theories that apply to digital crime and explain how cyber stalking and harassment could be the result of strains.
Humans and technology interact in all information systems : It is important to understand that humans and technology interact in all information systems.
What are the essential ingredients of symmetric cipher : List and briefly define categories of passive and active security attacks. What are the essential ingredients of a symmetric cipher?
Why is the future of computing in the cloud : Analyzing a subject you find in this article. Why is the future of computing in the cloud? Consider the concept of fractional ownership.
Each of the four phases in the evolution of cyber technology : Define and describe in your words the key technological developments of each of the four phases in the evolution of cybertechnology.
Information related to each of stps customers : While it should go without stating, information related to each of STP's customers and the products that you are transporting for them is highly sensitive,
How might you use your style with organization management : How might you use your style with organization management? How does your style prepare you for operations strategy?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a double precision function

Write a double precision function (result returned in $f0) with one double precision parameter (in $f12), along with a little driver program for testing your function.

  Identify and briefly describe four types of b2b web sites

What business functions are performed by e-procurement software? Why might an organization attempt to build its own e-procurement software rather than use existing software packages to meet these needs?

  Creating cut-over plan for alternate processing site

Create cut-over plan for alternate processing site based on given below. Consider LAN for small 100-person business, Pixel Inc. Business occupies one floor in an office building.

  Write a java program to display below layout

Write a TestLoanAppPanel class to test.Write a java program to display below layout

  Review and discuss methods for it managers to maintain

Review and discuss methods for IT managers to maintain their skills while gaining new managerial skills

  Assignment on excel using solver

Maximize Z= 400a +275b +190c subject to the following constrains : a) 7a +5b +4c

  Discuss the advantages and disadvantages of byod

Discuss the advantages and disadvantages of BYOD in the workplace. Include discussion of the information security implications of BYOD in the workplace.

  Software engineering-cmmi and itil

Realizing that an organization's CMMI level impacts an organization's success on requests for proposals (RFPs), your CIO wants to get the software development processes to CMMI level 3. Your organization has started developing software application..

  Write the equations of five concentric circles

Describe how you might determine the equation of a circle if you are given the endpoints of the circle's diameter

  People spend hundreds and hundreds of dollars

People spend hundreds and hundreds of dollars hiring writers to help them with their resume and cover letters.

  Operation of cache memory

Briefly explain the operation of 'Cache Memory'.

  Major problems associated with channeling funds

What are the two major problems associated with channeling funds from savers to investors?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd