Sample Final
These questions are very similar to the types of questions I will ask on the final. The final will be longer, though.
- In computer security, a Trojan horse is:
- A program that has components distributed over many systems, and is used to launch denial of service attacks
- A program that absorbs all available resources of a particular type
- A program with an overt, known purpose and a covert, unknown (and probably undesireable) purpose
- A program that blocks any incoming spam emails
- How does the Clark-Wilson model require authentication of users to be done?
- A trusted user must vouch for the new user
- Two-factor authentication must be used
- If passwords are used, they must be at least 12 characters long, and use a mixture of letters, digits, and other characters
- None of the above
- Which of the following does the Needham-Schroeder protocol require?
- A trusted third party
- A public key cryptosystem
- A certificate authority to identify the users
- A connection to the Internet
- Show how ACLs and C-Lists are derived from an access control matrix.
- Discuss the revocation problem with respect to access control lists and capabilities. How might one efficiently implement a command to revoke access to an object by one particular user?
- Consider the problem of managing certificates. One expert said that a hierarchical scheme, such as that employed by PEM, is more likely to be used for business than the Web of Trust employed by PGP. What specific features of the hierarchical system as implemented for PEM (and for other Internet applications) led him to make this assertion? Why might these features lead him to make this statement?
- Represent an integrity compartment label using the notation
( integrity level ; set of categories )
where the integrity levels are “high”, “medium”, “low”, or “unknown” (in decreasing order of trust) and the integrity categories are “dog”, “cat”, and “pig”. Can a user cleared for ( medium ; { dog , cat }) have read or write access (or both) to documents classified in each of the following ways under the Biba model?
- ( high ; { dog })
- ( low ; { dog })
- ( medium ; { dog , cat })
- ( unknown ; { pig })
- ( high ; { dog , pig , cat })
- Why do some organizations use a DMZ in their network configuration, rather than simply filtering traffic and allowing connections intended for the web and email servers to pass through the firewall?