Question: #1787

INFA610 FINAL Exam Complete Solution

FINAL – INFA610

Instructions

  • You are to take this final exam during the twelfth week of the class. This final exam will be posted before noon, Sunday, April 19, 2015 and is due on or before noon, Sunday, April 26, 2015. 
  • Work alone. You may not confer with other class members, or anyone else, directly or by e-mail or otherwise, regarding the questions, issues or your answers. You may use your notes, textbooks, other published materials, the LEO site for this class, and the Internet.
  • Wherever possible, make sure answers are stated in your own words, and where applicable provide your own examples, rather than repeating the ones used in the course materials. When composing your answers, be thorough. The more complete your answer, the higher your score will be. Be sure to identify any assumptions you are making in developing your answers. While composing your descriptive answers, be very careful to cite your sources. It is easy to get careless and forget to footnote a source. Remember, failure to cite sources constitutes an academic integrity violation. Use APA style for citations and references.
  • This final is worth 25% of your final grade for the course. It is scored on the basis of 100 points.
  • Please provide your answers immediately below the questions. (Do not submit answers alone in a separate sheet.)
  • Please submit your work using the Final Exam assignment folder.
  • No late submission for the final exam.

Exam Questions

Part 1: True (T) or False (F).  IMPORTANT:  If you answer False (F), then you MUST say WHY it is in a few words to receive full credit. (5 questions at 2point each, 10 points in all)  

 

EXAMPLE QUESTIONS ONLY

T  F         Your Professor’s last name is Douglas.   Answer: ___F___ (it is Kelly)

T  F         This course is INFO610.   Answer: ___T___

 

 

  1. T  F         Deep packet inspection firewalls protect networks by blocking packets based on the packets’ header information at the network (IP) layer.   Answer: _____   If F, why?           Employers have the right (and in some cases the obligation) to see any information stored, transmitted, or communicated within the employer's environment. This legal right is the basis for monitoring (or at least explicitly stating the right to monitor) email, network traffic, voice, wireless, and other communications.  Answer: _____
  2. T  F         Intrusion Detection Systems (IDS) provide no protection from internal threats. Answer: _____
  3. T  F         A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses.   Answer: _____

 

  1. T  F         Security awareness, training, and education programs are key components of organizational risk management strategies.

         Answer: _____                 

 

 

Part 2: Multiple Choice Questions. Print the correct answer in the blank following the question. (22 questions at 2 points each, 40 points plus 4 bonus points in all)

 

  1. Match the following TCP/IP protocol layer with its function (select a., b., c., or d. below): 

A. Network            1. Coordinates communication between applications.

B. Physical             2. Supports useful functions over the transport layer such identity/location of applications.
C. Application       3. Moves information between hosts that are not directly connected.
D. Transport         4. Moves bits between the nodes in the network.

 

  1. A--->3; B--->4; C--->2; D--->1
  2. A--->2; B--->4; C--->1; D--->4
  3. A--->2; B--->3; C--->4; D--->1
  4. A--->3; B--->4; C--->1; D--->2

 

Answer: _____________

 

  1. Protection of a software program that uses a unique, novel algorithm could legally be protected by:
  1. A patent
  2. A copyright
  3. A trademark
  4. Ethical standards

 

Answer: _____

 

  1. Security threats include which of the following:
  1. Unlocked doors
  2. Disgruntled employees
  3. Hurricanes
  4. Un-patched software programs
  5. All of the above

 

Answer: _____

 

  1. Denial of service attacks include (select one or more):
  1. Buffer overflow attack
  2. Smurf attack
  3. Ping flood attack
  4. SYN flood attack
  5. All of the above

 

Answer: _____

 

  1. A disgruntled employee creates a utility for purging old emails from the server. Inside the utility is code that that will erase the server’s hard drive contents on January 1st, 2016. This is an example of which of the following attacks?

 

  1. Virus
  2. Logic Bomb
  3. Spoofing
  4. Trojan horse
  5. Botnet
  6. Rootkit
  7. Backdoor

 

Answer: _____

 

  1. Mary is the cofounder of Acme Widgets, a manufacturing firm. Together with her partner, Joe, she has developed a special oil that will dramatically improve the widget manufacturing process. Mary and Joe plan to make large quantities of the oil by themselves in the plant after the other workers have left to keep the formula secret. They would like to protect this formula for as long as possible. What type of intellectual property protection best suits their needs?

 

  1. Copyright
  2. Trademark
  3. Patent
  4. Trade Secret

 

Answer:  _______

 

  1. You should clear cookies in your browser periodically because:

 

  1. They (Cookies) can be used to track your web browsing behavior and invade your privacy.
  2. They can facilitate impersonation attacks.
  3. They can be used to spread viruses.
  4. a. & b.
  5. b. & c.
  6. a., b. & c.

 

Answer:  _________

 

  1.  A TCP/IP session hijacking can be best described as:

 

a.

Providing false identity information to gain unauthorized access

b.

Establishing a connection without specifying a username or password

c.

An attacker takes control of a session between the server and a client

d.

Flooding the connection with too many requests

 

Answer:  _________

 

  1. Tracker attacks in databases get around:
  1. Anonymization
  2. Data transformation
  3. Query size restriction
  4. Data partitioning

Answer:  _________

  1. A race condition attack can result in:
  1. A symbolic link
  2. Object orientation
  3. A deadlock
  4. Access to low address memory locations

Answer: __________

 

  1. __________ is when the data in the SDB can be modified so as to produce statistics that cannot be used to infer values for individual record resource.
  1. Data perturbation
  2. Database access control
  3. Inference channeling
  4. Output perturbation

Answer: _________

  1. With __________ the records in the database are clustered into a number of mutually exclusive groups and the user may only query the statistical properties of each group as a whole.
  1. compromise
  2. inference
  3. partitioning
  4. query restriction

Answer: ________

  1. A web session (i.e., a session between a web browser and a web server) can be protected against the risk of eavesdropping in an economical and convenient manner through the use of which of the following?
  1. IPSec
  2. HTTP over SSL
  3. Link encryption
  4. Microsoft Encrypting File System (EFS)

Answer:  ______

               

  1. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access one of your internal application servers. Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised. Which of the following solutions are you most likely to implement?

 

  1. A firewall system at the connection point to the Internet
  2. An improved RBAC-based access control system for the application servers
  3. File-level encryption
  4. Kerberos authentication

 

Answer: _______

 

  1. What specific policy might most likely recommend removing a server from the network and re-installing all software and data?

 

a.

A privacy policy

b.

An authentication policy

c.

An incident response policy

d.

Wireless network access policy

                        Answer: ________

 

  1. The security risk of allowing dynamic content ( to execute) on a target machine is:
  1. The time delay from when it is downloaded and executed could make the browser experience not very satisfying.
  2. Malware may be included in the downloaded code and infect the target machine.
  3. The mobile code author may never be known.
  4. None of the above.

Answer: _______                     

 

  1. Encrypting a message with a private key (of the sender) in an asymmetric system provides:
    1. Proof of receipt
    2. Confidentiality
    3. Proof of origin
    4. Message availability

Answer:_______

 

  1. The correct ordering of the upper layers of the OSI model are:

 

  1. Session, application, presentation
  2. Session, presentation, application
  3. Session, application, presentation, physical
  4. Application, presentation, session, network

 

Answer: _______

 

  1. In relational database parlance, the basic building block is a __________, which is a flat table.

 

  1. attribute                                                     
  2. tuple                            
  3. primary key                                               
  4. relation
  5. field

 

 Answer: _____

                            

  1. Routers operate at the _____________ of the OSI stack?
    1. Transport
    2. Application
    3. Session
    4. Network
    5. Data Link

 

Answer: _____

 

  1. Gateways operate at the _____________ of the OSI stack?
    1. Transport
    2. Application
    3. Session
    4. Network
    5. Data Link

 

Answer: _____

 

  1. Which e-mail security protocol(s) depend(s) upon a “Web of Trust”?  
    1. Kerberos
    2. Public Key Infrastructure (PKI)
    3. Secure Sockets Layer (SSL)
    4. Transport Layer Security (TLS)
    5. Pretty Good Privacy (PGP)
    6. Secure Multipurpose Internet Mail Extensions (S/MIME)
    7. Privacy Enhanced Mail (PEM)
    8. Data Link

 

Answer: _____

 

 

 

 

Part 3: Short Answer Questions. (2 questions at 15 points each, 30 points in all; no more than 1 page, single-spaced for the answer to each question)

  1. Briefly describe the purpose of firewalls and how they work, including  two fundamental approaches to creating firewall policies and types of firewalls

 

 

 

 

  1. There are many threats associated with e-mail. List those threats and describe a mitigation strategy for each.

 

 

 

Part 4: Essay Question. (Maximum length: one and half page, single-spaced including at least 3 references; 20 points)

 

While sitting in the break room at work one day, Stan is talking with his friend Joe, who is excitedly describing an idea for a new intrusion detection system (IDS). Joe describes an elegant new algorithm that will flawlessly detect intrusion attacks and respond almost instantly. Stan, who is more of an entrepreneur than inventor, quickly grasps the essence of Joe’s idea, and decides to incorporate the idea into a commercial product, without the knowledge or participation of Joe. In his scheme to commercialize Joe’s idea, Stan plans to hire a programmer to implement Joe’s algorithm, and use the software to control a novel new hardware component. Stan would like to protect the intellectual property of the algorithm, software, and hardware component, but is experiencing some guilt pangs. Discuss the legal and ethical issues of this situation.

 

Solution: #1768

INFA610 FINAL Exam Complete Solution

Answer: ___A______ 8. A TCP/IP session hijacking can be best described as: a. Providing false identity information to gain unauthorized access b. Establishing a connection without specifying a username or password ...
Tutormaster
Rating: A+ Purchased: 11 x Posted By: Tutormaster
Comments
Posted by: Tutormaster

Online Users