Final Examination
Correct answers are in blue
Q1.(F.74) Which of the following correctly identifies what AH with tunnel mode protects? (2.5 point)
- All fields of the IP header, all fields of the AH header and the packet payload
- Selected fields of the outer IP header, selected fields of the AH header, selected fields of the inner IP header and the packet payload
- All fields of the outer IP header, all fields of the AH header and the packet payload
- All fields of the AH header, all fields of the inner IP header and the packet payload
- All fields of the AH header and the IP payload
- Selected fields of the outer IP header, all fields of the AH header, all fields of the inner IP header and the packet payload
- The IP payload
Q2.(F.57) Which of the following types of methods are commonly used for Mandatory Access Control (MAC)? (Select/check all that apply.) (2.5 points)
- Lattice-based
- Role-based
- Access Control Matrix
- Rule-based
- Access Control Bits
Q3.(F.58) Which of the following are true statements regarding security by function? (2.5 point)
- A system should detect attacks coming from outside the organization, but can safely assume that attacks within the organization, such as from an employee, will not occur
- Backing up an organization's critical data nightly, and creating a plan for restoring these backups if needed, is one piece of the recovery security function.
- Prevention focuses on providing negative motivational influences to help deter attacks.
- A properly secured system will never be attacked; therefore, properly secured systems do not need the ability to detect security-related incidents.
- Deterrence focuses on procedural or technological security mechanisms which help exterminate security-related incidents.
- Risk avoidance, deterrence, prevention, detection, and recovery are five independent security functions which are not related to each other. Changes to one security function within an organization do not effect changes in any of the other four.
Q4.(F.64) Which form of malware is able to send copies of itself to other nodes in the network without attach itself to existing programs or documents? (2.5 point)
- Key logger
- Virus
- Trojan horse
- Spyware
- Worm
Q5.(F.85) Which of the following are the major subject areas that a "Threat-Vulnerability Analysis" should cover? (Select/check all that apply.) (2.5 points)
- Asset vulnerabilities
- Likely attacks against assets
- Owners of assets
- Threat Agents that will target assets
- Asset values
- Asset recovery approaches
Q6.(F.82) Which of the following are security services are provided by IPSEC? (Select/check all that apply.) (2.5 points)
- Access Control
- Data Origin Authentication
- Data Confidentiality
- Rejection of Replayed Packets
- Limited Traffic Flow Confidentiality
- Data Integrity
- In-sequence delivery of sent packets
Q7.(F.93) Which of the following statements about Instant Messaging (IM) are valid? (2.5 point)
- No capability for scripting or delivery of malware, spyware etc.
- Never use encryption for confidentiality
- Have the capability for scripting or delivery of malware, spyware etc.
- Have robust password management
- Can be easily blocked by firewalls
Q8.(F.81) Which of the following identify the modes or transforms supported by IPsec (Select all choices that are correct)? (Select/check all that apply.) (2.5 points)
- Transport
- ESP
- IKE
- AH
- Tunnel
- ISAKMP
Q9.(F.59) Which of the following statements are correct regarding information integrity as a goal of security? (Select/check all that apply.) (2.5 point)
- To maintain information integrity, programmers should develop both on development systems and on production systems.
- There is no need to log user actions and events in a properly secured system.
- If an organization wishes to maintain information integrity, the duties of its critical functions should be separated among different employees.
- When the data in a system is modified only on rare occasions by unauthorized individuals, that system has information integrity.
- One way an organization can help maintain integrity is to require specific employees to use specific processes which cannot be changed or avoided without detection.
Q10.(F.96) When replacing an older server with a newer and faster server, which of the following should be done? (Select/check all that apply.) (2.5 points)
- The older server should be discarded in the trash after dragging all files to the recycle bin
- The older server should be given to an employee after dragging all files to the recycle bin
- The older server should be discarded in the trash after erasing all disk files using a DoD or NIST approved procedure
- The older server can be given to an employee after erasing all disk files using a DoD or NIST approved procedure
- The older server should be sold as surplus after dragging all files to the recycle bin
- The older server should be sold as surplus after erasing all disk files using a DoD or NIST approved procedure
Q11.(F.86) Which of the following provides Data-origin authentication of the sender? (Select/check all that apply.) (2.5 points)
- Sending a clear-text message along with a symmetrically encrypted message digest prepared from the clear-text message
- Sending a message asymmetrically encrypted using a private key
- Sending a clear-text message along with a message digest prepared from the clear-text message and a shared secret key
- Sending a message asymmetrically encrypted using a public key
- Sending a message and a message digest of the message where both are symmetrically encrypted using a shared secret key
- Sending a clear-text message along with a digital signature
- Sending a message symmetrically encrypted using a private key
Q12.(F.67) Which of the following mechanisms does Unix use for access control to files and directories? (2.5 point)
- Discretionary access control via inodes
- Access control rules
- Mandatory access control via inodes
- Discretionary access control via ACLs
Q13.(F.83) Which of the following are eight mandatory fields in X.509v3 digital certificates? (Select/check all that apply.) (2.5 points)
- Subject Public Key Information
- Signer Distinguished Name
- Version Number
- Subject Distinguished Name
- Validation Dates
- Algorithm Identifier
- Alternative Name Extension
- Serial Number
- URL of Certificate Revocation Lists
- Signer Digital Signature
Q14.(F.68) Which of the following protocols are said to use "an informal web of trust" rather than relying on certificate authorities? (2.5 point)
- ICMP
- PGP
- PKI
- IGP
- PEM
Q15.(F.87) Which of the following provides Data Confidentiality of a transmitted message? (Select/check all that apply.) (2.5 point)
- Sending a clear-text message along with a symmetrically encrypted message digest prepared from the clear-text message
- Sending a message asymmetrically encrypted using a public key
- Sending a clear-text message along with a digital signature
- Sending a message asymmetrically encrypted using a private key
- Sending a message symmetrically encrypted using a shared secret key
- Sending a clear-text message along with a message digest prepared from the clear-text message and a shared secret key
Q16.(F.94) Which of the following is the most important when it comes to ensuring that a security program is successful in an organization? (2.5 point)
- Weekly system backups with routine testing of backup restorability
- Internal web access to policies and procedures
- Biometric based smartcards for building access
- Centralized management of anti-virus on all desktop machines
- Senior management support, and approval
Q17.(F.90) Which of the following typically provides a service, or performs an operation, that the user considers desirable but also engages in other activities that the user is not aware of, such as stealing address book information or searching for passwords? (2.5 point)
- Trojan horse
- Worm
- Rootkit
- Virus
- Spyware
Q18.(F.77) Which of the following describe the purpose of each of the major components of IPsec? (2.5 point)
- IKE: used for peer-entity authentication and key management
ISAKMP: used to provide data origin authentication and data integrity
ESP: used to provide data origin authentication, data confidentiality and data integrity
Security Policy: used to identify and define attributes of security used between two corresponding entities. - IKE: used for peer-entity authentication and key management
AH: used to provide data origin authentication and data integrity
ESP: used to provide data origin authentication, optional data confidentiality and data integrity
SAs used to identify and define attributes of security used between two corresponding entities. - IKE: used for peer-entity authentication and key management
AH: used to provide data origin authentication and data integrity
ISAKMP: used to provide data origin authentication, data confidentiality and data integrity
SAs used to identify and define attributes of security used between two corresponding entities. - IKE: used for peer-entity authentication and key management
AH: used to provide data origin authentication, data confidentiality and data integrity
ESP: used to provide data origin authentication and data integrity
Security Policy used to identify and define attributes of security used between two corresponding entities.
Q19.(F.89) Which of the following are security services are provided by IEEE 802.1x? (Select/check all that apply.) (2.5 point)
- Data Integrity
- Limited Traffic Flow Confidentiality
- Data Confidentiality
- Rejection of Replayed Packets
- Access Control
- Authentication
Q20.(F.80) Which of the following types of attacks are defended against by message data-origin authentication which includes a timestamp or nonce? (Select/check all that apply.) (2.5 points)
- Message sequence modification
- Message source masquerading
- Message replay
- Message privacy
- Message content modification
Q21.(F.60) Which of the following statements are correct statements regarding ITU X.509 digital certificates? (2.5 point)
- A certificate is valid for a specific period of time, and that period begins the first time the certificate is used.
- An ITU-T x.509 digital certificate can be used to authenticate a subject.
- If the issuer name in the certificate can be verified as valid, then the data therein can be trusted.
- When a certificate is revoked, the same certificate is re-issued by the authority with the revoked field marked as "true".
Q22.(F.92) Turnover rate is the ratio of the number of workers that had to be replaced in a given time period to the average number of workers. If a company has a high 'turnover rate', which access control structure is best for access control of company resources? (2.5 point)
- Role based
- Decetralized
- Centralized
- Rule based
- Groups
- Lattice based
Q23.(F.88) Which of the following provides Information Integrity? (Select/check all that apply.) (2.5 points)
- Sending a clear-text message along with a message digest prepared from the clear-text message and a shared secret key
- Sending a clear-text message along with a digital signature
- Sending a clear-text message along with a symmetrically encrypted message digest prepared from the clear-text message
- Sending a message asymmetrically encrypted using a private key
- Sending a message symmetrically encrypted using a private key
- Sending a message asymmetrically encrypted using a public key
- All these forms of encryption
- No type of encryption provides information integrity
Q24.(F.66) Which of the following security mechanisms are provided by TCP wrappers? (2.5 point)
- Logging
- Data integrity
- Data-origin authentication
- Peer-entity authentication
Q25.(F.75) Which of the following lists human authentication factors from strongest (most reliable on left) to weakest (least reliable on right)? (2.5 point)
- What a person knows, What a person is, What a person has
- What a person is, What a person has, What a person knows
- What a person has, What a person is, What a person knows
- What a person has, What a person knows, What a person is
- What a person is, What a person knows, What a person has
- What a person knows, What a person has, What a person is
Q26.(F.63) Which of the following statements are correct regarding packet filtering at the IP layer? (Select/check all that apply.) (2.5 points)
- IP packet filtering rules can determine which IP packets may flow based on IP source and destination addresses
- IP packet filtering rules can determine which IP packets may flow based on TCP session state.
- IP packet filtering rules can determine which IP packets may flow based on transport protocol port numbers.
- IP packet filtering may either be applied to the perimeter of a network, or to individual hosts within a network, but it cannot be applied to both at the same time.
Q27.(F.79) Which of the following correctly identifies what AH with transport mode protects? (2.5 point)
- Selected IP header fields, all fields within the AH header and the packet payload
- Only the IP payload
- All fields within the IP header, all fields within the AH header and the packet payload
- All fields within the AH header and the IP payload
Q28.(F.62) Which of the following statements about the OSI and Internet network models is correct? (2.5 point)
- The OSI network model defines protocol layers that include mandatory security mechanisms.
- The Internet model has many practical applications which include mandatory confidentiality mechanisms..
- The physical layer exists in both the OSI and TCP network models requires the use of confidentiality mechanisms
- TCP and IP are protocols in the Internet network model can be used with optional security mechanisms.
Q29.(F.84) Which of the following are the primary targets of an attack within Voice over IP (VoIP) services? (Select/check all that apply.) (2.5 points)
- Signaling protocols (SIP or H.323)
- Actual voice conversations (RTP)
- Session Boarder Controllers
- SIP Proxy Servers
Q30.(F.71) Computer-based assets are vulnerable to many types of attacks. Choose all true statements regarding these kinds of attacks? (Select/check all that apply.) (2.5 points)
- All known vulnerabilities have been addressed in mature protocols such as TCP/IP.
- An application which runs on a hardened operating system with no known vulnerabilities is invulnerable
- Improperly configured computer systems can be vulnerable to attack.
- An operating system may have vulnerabilities, and these vulnerabilities may be difficult for an organization to address in a timely fashion, since the organization must rely upon the operating system vendor to correct the vulnerability.
Q31.(F.76) Does Java only provide minimal support for the use of X.509 digital certificates? (2.5 point)
- No
- Yes
Q32.(F.69) Which of the following are purposes of the IKE/(ISAKMP) part of IPsec? (Select/check all that apply.) (2.5 points)
- Peer-entity authentication
- Data origin authentication
- Key management
- Information integrity
- Confidentiality
Q33.(F.91) Which of the following are correct? (Select/check all that apply.) (2.5 points)
- A password and a security token number can be used for non-repudiation
- A password and a security token number can be used for login authentication
- A password and a fingerprint can be used authorization
- A passphrase can be used for login authentication
- A password and a security token number can be used for authorization
Q34.(F.70) Which of the following are primary security services as defined in ITU-T 800? (Select/check all that apply.) (2.5 points)
- Detection
- Non-Repudiation
- Identification
- Confidentiality
- Authorization/Access Control
- Availability
- Authentication
Q35.Why would you want to digitally sign your Diffie-Hellman Q value and then encrypt the Q value and digital signature with the other side’s public key? (2.5 points)
A correct answer should include:
This prevents the "man-in-the middle" from spoofing the identity of the sender by providing peer-entity authentication and confidentiality for the Q value sent.
Q36.Why are X.509 certificate chains necessary in order to verify a user certificate? < 2.5 Points>
A correct answer should include:
When the number of certificates increase, it is better not to issue all certificates from a single CA, it is better to distribute certificates among multiple CA, so when a user A has certificate from a specific CA1, wants to know the public key of anther user using certificate from CA2, user can read user's B certificate but can't verify its signature, so for A to verify B's certificate, it needs to trust its CA2, so user A can get CA2 certificate signed by his CA1, and A knows CA1 public key, it can get CA2 certificate and verify CA1 signature on it, then gets user B certificate and verify it with the trusted certificate of CA2.
So if the certificate chain doesn't exist, users with certificates from specific certificate authority will not be able to verify user's certificates from anther CA. X.509 certificate chains are necessary because, unlike Kerberos, X.509 authentication occurs offline. X.509 does not work with a third-party system, like a KDC, to authenticate a user and grant them tickets for access into a network/system. Certificates are instead included within applications and used for verification offline.
Q37.Suppose Alice, Bob, and Carol want to use secret key cryptography to authenticate each other. Compare the security of having a single shared secret that they all share with the security of having each of them use their own secret (Alice authenticates to either Bob or Carol by proving knowledge of KA, Bob with KB, and Carol with KC). ( 2.5 points)
A correct answer should include:
Neither Alice, Bob or Carol have an item that is truly unique to themselves that they can use to authenticate themselves such that their claimed identity cannot be forged. Therefore any of them can repudiate (deny) that they originated a message by just claiming that the other person which whom they share the secret keys actually originated the message in question.
Without the use of public key technology, they will still need to know each other's keys to the verification, which means they can still forge each other's messages
Q38.What is the difference between a message authentication code and a one-way hash function? ( 2.5 points)
A correct answer should include:
A hash function accepts a variable-size message as input and generates a fixed-size block of data (hash code or digest) as output. Hash provides only the structure required to achieve authentication since encryption with a key is not part of the hash function itself. A hash is a function of the input message only.
The message authentication code (MAC) either: