UT CS 361s - Final Exam (9 pages)

Previewing pages 1, 2, 3 of 9 page document View the full content.
View Full Document

Final Exam



Previewing pages 1, 2, 3 of actual document.

View the full content.
View Full Document
View Full Document

Final Exam

57 views

Exam


Pages:
9
School:
University of Texas at Austin
Course:
Cs 361s - Network Security and Privacy

Unformatted text preview:

CS 361S Network Security and Privacy Spring 2014 FINAL May 12 2014 DO NOT OPEN UNTIL INSTRUCTED YOUR NAME Collaboration policy No collaboration is permitted on this exam Any cheating e g submitting another person s work as your own or permitting your work to be copied will automatically result in a failing grade The UTCS code of conduct can be found at http www cs utexas edu undergraduate program code conduct 1 Final 125 points Problem 1 28 points Circle only one of the choices 4 points each 1 TRUE FALSE BGP route updates are authenticated by 16 bit random transaction IDs 2 TRUE FALSE To use a session filtering firewalls applications such as Web browsers and FTP clients must be modified accordingly 3 TRUE FALSE It is possible to create an anomaly detector which produces no false positives 4 TRUE FALSE Recall that an RSA modulus n is a product of two large primes If someone discovers an efficient algorithm for computing the greatest common divisor of two numbers then breaking RSA will become feasible 5 TRUE FALSE The main reason why WEP is insecure that the attacker who knows the plaintext can easily recover the keystream by XORing this plaintext with the ciphertext 6 TRUE FALSE With properly validated unforged certificates HTTPS security guarantees hold even if DNS has been poisoned 7 TRUE FALSE You are attempting to connect to a server which presents a self signed certificate If you accept it your security is the same as if you accepted a certificate issued by an untrusted certificate authority Problem 2 Problem 2a 4 points What is the difference between a Web attacker and a network attacker 2 Problem 2b 4 points What capabilities do Web attackers have that allow them to perform cross site request forgery attacks against websites that rely only on cookies for authentication Problem 2c 4 points What capabilities do Web attackers have that network attackers do not have Problem 3 Recall PwdHash a browser extension that automatically converts user s password into



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Final Exam and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Final Exam and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?