Exam 2017, questions PDF

Title Exam 2017, questions
Course Information And Network Security
Institution Monash University
Pages 6
File Size 167.6 KB
File Type PDF
Total Downloads 12
Total Views 73

Summary

Office Use Only Semester one 2017 Examination Period Faculty of Information Technology EXAM CODES: FIT3031 (SAMPLE EXAM PAPER ONLY) TITLE OF PAPER: Information and Network Security EXAM DURATION: 2 hours writing time READING TIME: 10 minutes THIS PAPER IS FOR STUDENTS STUDYING AT: (tick where applic...


Description

Office Use Only

Semester one 2017 Examination Period Faculty of Information Technology EXAM CODES:

FIT3031 (SAMPLE EXAM PAPER ONLY)

TITLE OF PAPER:

Information and Network Security

EXAM DURATION:

2 hours writing time

READING TIME:

10 minutes

THIS PAPER IS FOR STUDENTS STUDYING AT: (tick where applicable)  Berwick  Clayton  Malaysia  Off Campus Learning  Caulfield  Gippsland  Peninsula  Monash Extension  Parkville  Other (specify)

 Open Learning  Sth Africa

During an exam, you must not have in your possession any item/material that has not been authorised for your exam. This includes books, notes, paper, electronic device/s, mobile phone, smart watch/device, calculator, pencil case, or writing on any part of your body. Any authorised items are listed below. Items/materials on your desk, chair, in your clothing or otherwise on your person will be deemed to be in your possession. No examination materials are to be removed from the room. This includes retaining, copying, memorising or noting down content of exam material for personal use or to share with any other person by any means following your exam. Failure to comply with the above instructions, or attempting to cheat or cheating in an exam is a discipline offence under Part 7 of the Monash University (Council) Regulations.

AUTHORISED MATERIALS OPEN BOOK

 YES

 NO

CALCULATORS

 YES

 NO

SPECIFICALLY PERMITTED ITEMS if yes, items permitted are:

 YES

 NO

Candidates must complete this section if required to write answers within this paper

STUDENT ID:

__ __ __ __ __ __ __ __

DESK NUMBER:

__ __ __ __ __

Page 1 of 6

Full Marks: 60 marks There are TWO sections. ANSWER ALL QUESTIONS in both sections in your answer book.

Section A. Multiple Choice. (20 marks) Choose only one answer that best completes the statement. 1 mark for each question. 1. Which of the following algorithm is a symmetric encryption algorithm? A. RSA B. Diffie-Hellman C. SHA-256 D. DES 2. Which of the following attack(s) is/are active attack? (i) Replay (ii) Modification of Message (iii) Denial-of-Service A. (i) only B. (i) and (iii) C. (ii) and (iii) D. All of the above 3. Which of the following statement(s) regarding symmetric encryption is/are not true? A. The encryption key is the same as decryption key B. Symmetric key encryption is slower than asymmetric key encryption C. AES can be speed up using hardware module D. All of the above statements are not true 4. Which of the following encryption algorithm is NOT used in 4G LTE? A. SNOW 3G B. AES C. 3DES D. ZUC 5. Asymmetric encryption can solve the __________ problem(s) of symmetric encryption. A. key distribution B. integrity C. efficiency D. all of the above

Page 2 of 6

6. Which of the following statement(s) regarding a hash function is/are true? (i) The output length of a hash function depends on the input message. (ii) It is collision-resistant. (iii) It is one-way. A. (i) only B. (ii) only C. (ii) and (iii) D. None of the above 7. A signcryption is a combination of ______________. A. encryption and hash function. B. encryption and key-exchange C. signature and key-exchange D. signature and encryption 8. In IPSec, __________ encrypts the whole IP packet. A. tunnel mode B. transport mode C. host-to-host mode D. every mode 9. Which of the following issue(s) is/are related to WEP? A. No mutual authentication B. Directly uses master key C. IV value is too small D. All of the above 10. __________ is used to secure email. A. SMTP B. S/MIME C. Telnet D. Kerberos 11. Trapdoors are left during the software __________ phase. A. authentication B. certification C. development D. execution

Page 3 of 6

12. Which of the following statement regarding SHA-1 is true? A. CWI Amsterdam and Google had performed a collision attack against SHA-1, publishing two dissimilar PDF files which produce the same SHA-1 hash. B. CWI Amsterdam and Google had invented a polynomial time algorithm to find two different integers which produce the same SHA-1 hash. C. CWI Amsterdam and Google had performed a one-wayness attack against SHA-1, such that given any random 160-bit string, they can re-construct a PDF file which produces this SHA-1 hash. D. CWI Amsterdam and Google had invented a polynomial time algorithm to find the input of the hash function x, for any given 160-bit integer y such that H(x)=y where H( ) is the SHA-1 function. 13. The security of Diffie-Hellman Algorithm relies on the __________ problem. A. factorization B. subset sum C. discrete logarithm (DL) D. learning with errors (LWE) 14. IPSec is used to secure the __________ layer. A. application B. TCP C. IP D. physical 15. X.509 is a standard of __________ . A. digital signature B. email security C. wireless-LAN security D. digital certificate 16. Which of the following activities are examples of Intrusion? (i) Cracking password (ii) Distributing pirated software (iii) Using e-banking service from a web browser in a library public computer during opening hours A. (i) and (ii) B. (ii) and (iii) C. (i) and (iii) D. All of the above 17. SSH is an encrypted version of __________ . A. MIME B. http C. telnet D. Internet Protocol

Page 4 of 6

18. Cloning of 4G SIM card can be done using __________ attack. A. man-in-the-middle B. SQL injection C. Denial-of-Service D. side-channel 19. Which of the following statement(s) describe(s) correctly the difference(s) between a virus and a worm? A. A virus cannot be spread without a human action, but a worm has the capacity to travel without any human action. B. A virus does not have the dormant phase, but a worm does have. C. In the propagation phase, a virus searches for other systems but a worm only searchers for other programs running within the same system. D. All of the above are correct 20. Which of the following is/are the limitation(s) of a firewall? A. Cannot protect from attacks bypassing it B. Cannot protect against internal threat C. All of the above are limitations of a firewall D. There is no limitation of a firewall

Section B: Questions & Answers. (40 marks) 1. (a) Briefly explain the following security services: (4 marks) (i) Confidentiality (ii) Access Control (iii) Integrity (iv) Availability (b) Which of the above security services (i) – (iv) can a signcryption provide? Explain your answer. (6 marks) 2. (a) Which of the following (n,e) pair is a correct RSA public key? (i) n = 35, e = 3 (ii) n = 85, e = 3 Explain your answer. (3 marks) (b) For the correct RSA public key in part (a), what is the corresponding private key d? Show your steps. (3 marks) (c) Use the correct RSA public key in part (a) to encrypt a plaintext m=5. Show your steps. (2 marks)

Page 5 of 6

3. Which Cipher Block Modes of Operations, ECB or CBC, is more commonly used? Give one advantage of using CBC over ECB and one disadvantage of using CBC over ECB. (3 marks) 4. Give any FOUR security services that IPSec can provide. (4 marks) 5. Give THREE possible attacks that involve password capture. (3 marks) 6. (a) What are the two default policies of packet filtering firewall? (1 mark) (b) Give TWO advantages and THREE disadvantages of using packet filtering firewall over application level gateway firewall. (5 marks) 7. What is Domain Keys Identified Mail (DKIM)? How is the DKIM e-mail authentication service different when compared to S/MIME or PGP? Give TWO differences. (3 marks) 8. What is CryptoLocker? What is its destructive action? How can we restore the destroyed data? (3 marks)

*** END ***

Page 6 of 6...


Similar Free PDFs