mid exam practice quiz

docx

School

Arizona State University *

*We aren’t endorsed by this school

Course

21120

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

10

Uploaded by AgentCapybara6567

Report
1. Question 1 After applying an encryption algorithm to a message as input, what is the right term to refer to the output? 1 point Cleartext Encryption key Ciphertext Plaintext 2. Question 2 The analysis of cryptography algorithms is called cryptanalysis. What is a goal of cryptanalysis? 1 point To recover the plaintext of an encrypted message without having the key To generate random numbers To calculate the entropy of a message To determine the encoding of a message 3. Question 3 One-time pad (OTP) is perfectly secure only when secure keys are used. How can we generate secure keys for one-time pads? 1 point Generate random and long-enough keys that have never been used before. Generate keys that do not contain English letters. Since keys without English letters are scarce, these keys can be reused sometimes. However, the keys must be re-generated periodically. Generate complicated and long-enough keys. The keys must be re-generated periodically. Generate and reuse random and long-enough keys. 4. Question 4 What does it mean when a crypto algorithm is computationally secure? 1 point
Brute forcing the key will not work. The time required to break the cipher is over 25 years on a workstation. The crypto algorithm cannot be broken with current computer technology within a reasonable period of time. No one will be able to decrypt an encrypted message unless he or she is the legitimate owner of the message and has the key. 5. Question 5 A one-way hash function takes an input string and generates an output string. What do we know about the length of the output string? 1 point The length of some output strings might be 0. The output string is of a fixed length. The output string is randomly sized. The length of the output string is determined by the input string. 6. Question 6 Given an encryption algorithm over the integer domain enc(plain, key) = plain + key with key being 5, please encrypt integer 27. What is the encryption result? 1 point An integer, 44 An integer, 275 A string, "275" An integer, 32 7. Question 7 In secure asymmetric crypto systems (or public-key crypto systems) with a private key and a public key, how challenging it is to calculate one key from the other? 1 point It is extremely difficult to calculate one key from the other key. It is easy to calculate one key as long as the other key is known.
It is easy to calculate the public key from a private key, but difficult to calculate the private key from a public key. It is easy to calculate the private key from a public key, but difficult to calculate the public key from a private key. 8. Question 8 In secure asymmetric cryptosystems (or public-key crypto systems) with a private key and a public key, how is the encryption performed? 1 point The encryption is performed using two private keys but not the public key. The encryption is performed using a private key. The encryption is performed using both a private key and a public key. The encryption is performed using two public keys but not the private key. 9. Question 9 Which hashing algorithm is still considered secure? 1 point SHA256 MD5 MD4 SHA1 10. Question 10 The predictability of random number sequences generated by a pseudo random number generator (PRNG) is related to its seed. To prevent the random number sequence from being guessed or predicted, which seed is ideal? 1 point The current timestamp (in seconds) ASCII values of a constant string (e.g., 0x61616161, converted from string "aaaa") The output of a better random number generator (e.g., byte sequences from /dev/random on Linux, or CryptGenRandom() on Windows) A constant integer (e.g., 1337)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
11. Question 11 RSA is a secure asymmetric cryptographic system. Against which attack is RSA secure ? 1 point Timing side-channel attacks Brute forcing the private key Power side-channel attacks Deriving the private key from a public key (e.g., factorizing N for RSA and recovering p and q ) 12. Question 12 Which action is GnuPG capable of doing? 1 point Scanning networks Performing encryption Sniffing network traffic Brute forcing passwords 13. Question 13 Address Resolution Protocol (ARP) is a protocol used on Local Area Networks (LAN). What does it do? 1 point ARP maps domain names to IP addresses. ARP maps services to ports. ARP maps IP addresses to MAC addresses. ARP maps machines to machines. 14. Question 14 Tcpdump is a tool for capturing traffic. Consider this command line: tcpdump -i any -w dump.pcap What do -i and -w mean in this command line? 1 point
-i means specifying a network interface; -w means writing captured traffic to a file -i means specifying a network interface; -w means filtering expressions -i means specifying an interval of seconds between capturing; -w means filtering expressions -i means specifying an interval of seconds between capturing; -w means writing captured traffic to a file 15. Question 15 ARP spoofing attacks may lead to traffic eavesdropping and hijacking on a Local Area Network (LAN). What is a proper defense against ARP spoofing attacks? 1 point Disabling all UDP traffic Disabling all TCP traffic Using only switches for relaying traffic inside LAN Configuring static ARP entries on routers and all hosts 16. Question 16 Table A Destination Gateway Genmask Flags Iface 192.168.1.252 0.0.0.0 255.255.255.255 UH eth0 192.168.1.0 0.0.0.0 255.255.255.0 U eth0 127.0.0.0 0.0.0.0 255.0.0.0 U lo 0.0.0.0 192.168.1.1 0.0.0.0 UG eth0 Table A Review Table A . What kind of table is Table A? 1 point An ARP table A gateway table A rainbow table A routing table
17. Question 17 Codeblock: Output 1 2 3 4 5 6 7 Host 192.168.31.11 appears to be up. Host 192.168.31.19 appears to be up. Host 192.168.31.22 appears to be up. Host 192.168.31.43 appears to be up. Host 192.168.31.181 appears to be up. Codeblock: Output Review Codeblock: Output . This is the output after running a command under Linux. What is the user most likely trying to do? 1 point The user is trying to use nmap to detect alive hosts. The user is trying to use traceroute to detect an alive host and the liveness of all other hosts on the path to the target host. The user is trying to use ping to detect alive hosts. The user is trying to use ls to detect alive hosts. 18. Question 18 In Smurf attack, an attacker sends a request to IP broadcast addresses and forces other hosts on the same network to send many responses to the victim host, causing denial- of-service on the victim host. Which protocol does the Smurf attack exploit? 1 point ICMP
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
DNS CDN UDP 19. Question 19 Codeblock: Output of Traceroute 1 2 3 4 5 6 7 8 9 10 11 12 13 $ traceroute www.t-mobile.com traceroute to www.t-mobile.com (107.154.106.99), 30 hops max, 60 byte pac kets 1 23.92.24.2 (23.92.24.2) 0.567 ms 23.92.24.3 (23.92.24.3) 0.488 ms 0.975 ms 2 173.230.159.70 (173.230.159.70) 0.767 ms 0.535 ms 0.715 ms 3 eqix-sv1.imperva.com (206.223.116.210) 0.862 ms 11.931 ms 0.829 ms 4 * * * 5 * * * 6 * * * 7 * * * 8 * * * 9 * * *
Codeblock: Output of Traceroute Review Codeblock: Output of Traceroute . All responses beyond the 4th hop are missing. Which explanation for this can we rule out entirely? 1 point Hop 3 is an IPv6-only gateway and does not forward any IPv4 traffic. Hop 4 is out-of-service or offline. Hop 4 is filtering certain ICMP responses. Hop 3 (206.223.116.210) is filtering certain ICMP responses. 20. Question 20 Codeblock: Output 1 2 3 4 5 6 7 8 9 10 11 12 13 19:37:31.305674 192.168.1.100.41481 > 192.168.1.10.138: udp 0 (ttl 46, id 61284) 19:37:31.305706 192.168.1.100.41481 > 192.168.1.10.134: udp 0 (ttl 46, id 31166) 19:37:31.305730 192.168.1.100.41481 > 192.168.1.10.137: udp 0 (ttl 46, id 31406) 19:37:31.305734 192.168.1.100.41481 > 192.168.1.10.140: udp 0 (ttl 46, id 50734) 19:37:31.305770 192.168.1.100.41481 > 192.168.1.10.131: udp 0 (ttl 46, id 33361) 19:37:31.305775 192.168.1.100.41481 > 192.168.1.10.132: udp 0 (ttl 46, id 14242) 19:37:31.305804 192.168.1.10 > 192.168.1.100: icmp: 192.168.1.10 udp port 134 unreachable
19:37:31.305809 192.168.1.100.41481 > 192.168.1.10.135: udp 0 (ttl 46, id 17622) 19:37:31.305815 192.168.1.100.41481 > 192.168.1.10.139: udp 0 (ttl 46, id 52452) 19:37:31.305871 192.168.1.10 > 192.168.1.100: icmp: 192.168.1.10 udp port 140 unreachable 19:37:31.305875 192.168.1.10 > 192.168.1.100: icmp: 192.168.1.10 udp port 131 unreachable Codeblock: Output Review Codeblock: Output . Given this output, which task is most likely being performed? 1 point ICMP port scanning TCP port scanning UDP port scanning UDP spoofing 21. Question 21 Compared to IPv4, IPv6 is more secure. Which attack is no longer possible in IPv6? 1 point IP spoofing DNS hijacking ARP spoofing IP scanning 22. Question 22 Which type of cryptographic algorithm is AES? 1 point
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
An asymmetric encryption algorithm A public-key crypto system A symmetric encryption algorithm A hashing algorithm