8082 MidTermPaper
8082 MidTermPaper
Encircle appropriate option(s). Total marks for this part are 15. Concentrate on your own paper as your peers
may have a different version the paper.
2. DOS attack is much more difficult to accomplish than gaining administrative access to a machine.
a) TRUE b) FALSE
4. How many unique eight (7) digits PINs are possible? Check the correct answer:
5. A system call allows application code to gain access to functionality implemented by the OS. A system call is often called a
protected procedure call. the cost of a system call is _________
a) same as a regular call. b) higher than a regular call c) lesser than a regular call d) None of the above
a) Authorization –> Authen- b) Authentication –> Autho- c) Resource Access –> Au- d) Both a and b
tication –> Resource Access rization –> Resource Access thorization –> Authentication
a) True b) False
9. Which of the following mode of cipher can be used for stream cipher?
11. Which of the following is the strongest against brute force attack?
14. In public-key cryptosystem, who know the private key of key owner:
a) Certification Authority b) Only the owner c) Both CA and Owner d) Reciever and CA
16. A number of online banking systems send a limited lifetime PIN to your smartphone for you to be able to authenticate
yourself to the bank. Is this an example of...
a) Something you have b) Something you are c) Something you know d) OTP
17. The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is
given.
18. An attacker correctly guesses Alice’s password and logins in as her. Is this a case of...
19. A randomly chosen password has six characters that include upper and lower case letters, digits (0-9). In the worst case,
how many attempts must a brute-force method make to determine a password when its hashed value is available?
22. Brute-force attack is a guaranteed way to break any password. What can be the way to overcome the brute-force attack?
a) Social Engineering b) Limiting number of pass- c) Input validation d) None of the above
word attempts
23. To decrypt using AES, just run the same algorithm with reverse key order.
a) True b) False
a) Given message m, It should b) Given m1, it is computa- c) Given H(m), there is no d) Any size of message gen-
be easy to compute H(m) tionally impossible to find easy way to find m erates fixed size (128-512)
m2 s.t. H(m2) = H(m1) output.
26. Revocation of access certain access rights can be carried out easily in systems that use...
27. Which ONE of the following is NOT a solution to prevent SYN flood attack?
a) Decrease the wait time for b) Not store the connection c) Avoid client connections d) use SYN cookies
half open connection information
a) It cannot show absence of b) It does not scale to prac- c) Difficult to understand d) All of the above
a problem tical large size systems
a) Is part of the TCB b) is not part of the TCB c) is the only part of the TCB d) is the only trusted part of
the TCB