Upload
abrasaxeimi370
View
215
Download
0
Embed Size (px)
Citation preview
7/29/2019 88-590 - 2003 - Final Exam
1/3
1/3
University of WindsorDepartment of Electrical and Computer Engineering
ECE 88-590-18: Network SecurityFinal Examination
December 16, 2003
CLOSED BOOK, CLOSED NOTES TIME: 2 Hours TOTAL MARKS: 100
Note: (1) Attempt all the problems. (2)Please read all questions once, andclarify any questions you may have first. (3) No questions will beanswered after 15 minutes into the exam time. (4) Only one page cribsheet in your own handwriting is allowed in the exam (both sides maybe used).
Problem 1. (a) What is the primitive root of a number?(b) Given 2 as a primitive root of 29, solve the following
congruence:
X2 4X 16 0 mod 29
Problem 2. The following diagram illustrates an authentication procedure.Explain it.
Problem 3. Indicate false (F) or true (T):
(a) IPSec encompasses three functional areas of authentication,confidentiality and privacy.
(b) An IPSec implementation needs a database of SecurityAssociations used.
(c) Transport mode provides protection to the entire IP packet.(d) IPSec is optional in IPv4.
7/29/2019 88-590 - 2003 - Final Exam
2/3
2/3
(e) The purpose of the dual signature is to link two messages thatare intended for two different recipients.
(f) Firewalls cannot be categorized according to the layers of theInternet protocol stack at which they operate.
(g) The PPTP, L2F, GRE, and L2TP are tunneling protocols.
(h) SNMP was designed to be an application-level protocol.(i) SSL is an application-level security protocol.(j) The SSL Handshake Protocol operates on top of the SSL
Record Protocol.
Problem 4. A typical scenario for public-key distribution is illustrated in thefollowing diagram.
(a) Describe this scheme, as steps marked in the figure.(b) What are the drawbacks, if any?
Problem 5. In the following diagram, what are the role of an Acquirer and aPayment Gateway?
7/29/2019 88-590 - 2003 - Final Exam
3/3
3/3
December 2, 2003 ECE Dept. University of Windsor 4
Secure Electronic Commerce Component
Problem 6. The following diagram shows the role of SNMP as a networkmanagement protocol.
(a) What are the basic components of SNMP?(b) What is a MIB?(c) What is a SNMP Trap?(d) What is the relationship among SNMPv1, SNMPv2, and SNMPv3?
ManagementFunctions (FCAPS)
Processes
Appl ication
AccessControl and
User Interface
Queries/ResponseAgent
FunctionProcesses
MIB
Traps/Alarms
ManagementStation
ManagedDevice