Exam 1 Sample
Exam 1 Sample
Exam 1 Sample
Attached below are the sample questions for the next Friday's test. The test will end before Saturday noon
time so please manage your time to do it and please note that there is no make up test if you miss it. Overall,
the test is very easy so I think most of you won't have problem.
Below are some sample questions from each section (these questions might be or might not be a subset of the
exam questions). While you are preparing the test, you might want to start from those questions, know
the basic concepts for True/False, Multiple Choice and Filling Blanks. I will not provide solutions to
the sample questions and will not answer emails asking for solutions. Good Luck !
The exam is open notes, open book, and open Internet. The exam is only
available from Friday, February 16th, 2018 (00:00 AM) to Saturday, February 17 (1:00 PM) . You
have only one attempt of 75 minutes to complete the exam once you begin. The
Exam will save and submit automatically when time expires.
Sample Questions
True/False
With the introduction of the computer the need for automated tools for protecting files and other information
stored on the computer became evident.
There are clear boundaries between network security and internet security.
The CIA triad embodies the fundamental security objectives for both data and for information and computing
services.
In developing a particular security mechanism or algorithm one must always consider potential attacks on
those security features.
Patient allergy information is an example of an asset with a moderate requirement for integrity.
The essence of a symmetric block cipher is that a single round offers inadequate security but that multiple
rounds offer increasing security.
In the ECB mode of encryption if an attacker reorders the blocks of ciphertext then each block will still
decrypt successfully, however, the reordering may alter the meaning of the overall data sequence.
…….......
Multiple Choice
__________ is a procedure that allows communicating parties to verify that received messages are authentic.
Message authentication
ECB
Passive attack
Encryption
asymmetric
symmetric
bit patterned
one key
SHA
MAC
OWH
ECB
five
three
six
four
one block
two blocks
four blocks
three blocks
The _________ key size is used with the Data Encryption Standard algorithm.
56 bit
128 bit
168 bit
32 bit
..................
__________ prevents either sender or receiver from denying a transmitted message; when a message is sent the
receiver can prove that the alleged sender in fact sent the message and when a message is received the sender
can prove that the alleged receiver in fact received the message.
A __________ attack attempts to learn or make use of information from the system but does not affect system
resources.
In the context of network security, _________ is the ability to limit and control the access to host systems and
applications via communications links.
__________ prevents either sender or receiver from denying a transmitted message; when a message is sent the
receiver can prove that the alleged sender in fact sent the message and when a message is received the sender
can prove that the alleged receiver in fact received the message.
__________ is a stream cipher used in the Secure Sockets Layer/Transport Layer Security standards that have
been defined for communication between Web browsers and servers and is also used in WEP and WPA
protocols.
The _________ algorithm takes the ciphertext and the same secret key and produces the original plaintext.
A _________ cipher processes the plaintext input in fixed sized blocks and produces a block of ciphertext of
equal size for each plaintext block.
The three most important symmetric block ciphers are: triple DES (3DES), the Advanced Encryption
Standard (AES), and the ___________ .
The _________ was developed by NIST and published as a federal information processing standard in 1993.
A _________ is when two sides cooperate to exchange a session key.
Like the MAC, a __________ accepts a variable size message M as input and produces a fixed size message
digest H(M) as output. Unlike the MAC, it does not take a secret key as input.
The __________ algorithm accepts the ciphertext and the matching key and produces the original plaintext
Essay:
Sensor X periodically sends a 32-octet measurement to a receiver Y (1 octet = 8 bits). One day the
administrator decides that X should protect the measurement data by adding a MAC obtained using DES in
CBC mode (in the standard way). How many octets does X now send for each measurement? Explain your
answer.
Answer: Omitted.
Consider Alice sending Bob a cipher message C1 with plaintext M1. Message is encrypted
using AES in Counter mode (CRT Mode), i.e.,
Kj = E(K, Tj)
Cj = Mj ⊕ Kj
where 'K' is the encryption key, 'Tj' is a counter (nonce) corresponding to block j,
'Mj' is the plaintext block j, and 'Cj' is the ciphertext corresponding to 'Mj'.
a. An adversary Charlie can intercept and change messages. Assume Charlie somehow knows
plaintext M1 for a particular ciphered message m = C1. Explain how he can modify the
message as M1’ to fool Bob (Bob receives C1’ as the ciphertext of M1’).