Assignment title: Management
(1) The Caesar cipher is an example of A substitution cipher A permutation cipher A mono-alphabetic cipher A product cipher (2) In this subject you have learned the RSA algorithm. What does the acronym RSA stand for? Reversible Secret Algorithm Rivest Shamir Adleman Rivest Shaman Adler Rivers Shamin Alderman (3) Which of the following terms specifically describes malicious code that activates when a specified condition occurs? Trojan Horse Rabbit Trapdoor Logic Bomb (4) Which key size is used with the AES encryption algorithm? 128 bits 192 bits 256 bits Any of the above (5)The international standard for rating the security of a computer system is called The Common Criteria The Universal Criteria The Trusted Evaluation Criteria The Orange Book Standard (6) A __________ can forward or block messages based on the information in the message itself Packet filtering gateway Application proxy Stateful inspection firewall Personal firewall (7) Which of the following attacks make use of the router broadcast mode function? SYN flooding DDoS Smurf Ping-of-Death (8) Which of the following is NOT a valid type of IDS Signature-based Anomaly-based Host-based Stealth-based (9) Assume the Bell-Lapadula model and a user Phil with a classification of (SECRET{A,B,C,D}). Which of the following can Phil make his current security level? Note: For this question, assume that TOP SECRET > SECRET > CONFIDENTIAL (CONFIDENTIAL{A,C,D,E}) (CONFIDENTIAL{A,B,C}) (SECRET{E,F,G}) (TOP SECRET{A,B}) (10) A transient virus Locates itself in main memory and can remain active even after its attached program terminates liability Only runs when the program it is attached to runs and terminates when its attached program ends Only runs when a specific condition occurs, such as a particular time or date Does not need to attach itself to a host and can spread copies of itself throughout a network (11) Which access controls are structured and coordinated with a data classification scheme? mandatory access controls role-based controls discretionary access controls nondiscretionary controls (12) Which of the following criteria would not satisfy the legal use of a packet sniffer? having direct authorization of the network's owners being on a network that the organization leases having knowledge and consent of the content creators (users) being on a network that the organization owns (13) Which of the following characteristics currently used today for authentication purposes is not considered truly unique? fingerprints retina iris ID Cards (14) Which of the following attributes does not apply to software information assets? serial number logical location controlling entity physical location (15) The _______ policy is vulnerable to Trojan horse attacks. MAC DAC RBAC MAC and RBAC (16) Which one of the following qualities is not part of the authentication mechanism to confirm user identity – something the user knows something the user loss something the user has something the user is (17) Which of the following types of malicious code replicates itself without limit to exhaust resources – Trojan Horse Virus Worm Rabbit (18) Which of the following mechanism gives low granularity of access rights – Tagged Architecture base/bounds registers relocation fence (19) A ___________ is responsible for enforcing the security mechanisms of the entire operating system. reference monitor trusted path security kernel audit log reduction (20) Which one of the following is considered as powerful tool for trusted system designers because it allows users to access complex objects in carefully controlled manner Virtualization Simulation Trusted computing base (TCB) Kernel Distinguish among vulnerability, threat and control. Explain the working principles of triple DES Describe with example of asymmetric/public key crypto-system. What is fence register and how it differs from variable fence register? Describe the security features of Trusted Operating Systems (TOS). Distinguish between heuristic Intrusion Detection System (IDS) and signature-based Intrusion Detection System (IDS) in terms of attack pattern. Define penetration testing and compare it with formal verification in terms of assurance testing technique. Define screening router and explain how it differs with an application proxy. Describe the fundamental principles of Clark-Wilson security policy. User Mitchell is cleared at (SECRET {ORANGE, BLUE, RED, GREEN}) and the document salaries.txt is classified at (CONFIDENTIAL {RED}). In a Bell-La Padula(BLP) system, is there any way that Mitchell can write to this document? Give full details. Note: For this question, assume that TOP SECRET > SECRET > CONFIDENTIAL. Explain with examples the differences between link encryption and end-to-end encryption. What are the limitations of base/bounds registers and explain how tagged architecture can overcome these limitations? Briefly describe the primitives that allow changes to be made to the access matrix in the access control matrix model. Describe the fundamental features of Reverse Turing Test (RTT). Describe the characteristics of reference monitor and explain how it associates with security kernel