INFA610 FINAL Exam Complete Solution
FINAL – INFA610
Instructions
Exam Questions
Part 1: True (T) or False (F). IMPORTANT: If you answer False (F), then you MUST say WHY it is in a few words to receive full credit. (5 questions at 2point each, 10 points in all)
EXAMPLE QUESTIONS ONLY
T F Your Professor’s last name is Douglas. Answer: ___F___ (it is Kelly)
T F This course is INFO610. Answer: ___T___
Answer: _____
Part 2: Multiple Choice Questions. Print the correct answer in the blank following the question. (22 questions at 2 points each, 40 points plus 4 bonus points in all)
A. Network 1. Coordinates communication between applications.
B. Physical 2. Supports useful functions over the transport layer such identity/location of applications.
C. Application 3. Moves information between hosts that are not directly connected.
D. Transport 4. Moves bits between the nodes in the network.
Answer: _____________
Answer: _____
Answer: _____
Answer: _____
Answer: _____
Answer: _______
Answer: _________
a. |
Providing false identity information to gain unauthorized access |
b. |
Establishing a connection without specifying a username or password |
c. |
An attacker takes control of a session between the server and a client |
d. |
Flooding the connection with too many requests |
Answer: _________
Answer: _________
Answer: __________
Answer: _________
Answer: ________
Answer: ______
Answer: _______
a. |
A privacy policy |
b. |
An authentication policy |
c. |
An incident response policy |
d. |
Wireless network access policy |
Answer: ________
Answer: _______
Answer:_______
Answer: _______
Answer: _____
Answer: _____
Answer: _____
Answer: _____
Part 3: Short Answer Questions. (2 questions at 15 points each, 30 points in all; no more than 1 page, single-spaced for the answer to each question)
Part 4: Essay Question. (Maximum length: one and half page, single-spaced including at least 3 references; 20 points)
While sitting in the break room at work one day, Stan is talking with his friend Joe, who is excitedly describing an idea for a new intrusion detection system (IDS). Joe describes an elegant new algorithm that will flawlessly detect intrusion attacks and respond almost instantly. Stan, who is more of an entrepreneur than inventor, quickly grasps the essence of Joe’s idea, and decides to incorporate the idea into a commercial product, without the knowledge or participation of Joe. In his scheme to commercialize Joe’s idea, Stan plans to hire a programmer to implement Joe’s algorithm, and use the software to control a novel new hardware component. Stan would like to protect the intellectual property of the algorithm, software, and hardware component, but is experiencing some guilt pangs. Discuss the legal and ethical issues of this situation.
INFA610 FINAL Exam Complete Solution
Answer: ___A______ 8. A TCP/IP session hijacking can be best described as: a. Providing false identity information to gain unauthorized access b. Establishing a connection without specifying a username or password ...
A+ - Thank you!
Thanks for the positive feedback!