88-590 - 2003 - Final Exam

Embed Size (px)

Citation preview

  • 7/29/2019 88-590 - 2003 - Final Exam

    1/3

    1/3

    University of WindsorDepartment of Electrical and Computer Engineering

    ECE 88-590-18: Network SecurityFinal Examination

    December 16, 2003

    CLOSED BOOK, CLOSED NOTES TIME: 2 Hours TOTAL MARKS: 100

    Note: (1) Attempt all the problems. (2)Please read all questions once, andclarify any questions you may have first. (3) No questions will beanswered after 15 minutes into the exam time. (4) Only one page cribsheet in your own handwriting is allowed in the exam (both sides maybe used).

    Problem 1. (a) What is the primitive root of a number?(b) Given 2 as a primitive root of 29, solve the following

    congruence:

    X2 4X 16 0 mod 29

    Problem 2. The following diagram illustrates an authentication procedure.Explain it.

    Problem 3. Indicate false (F) or true (T):

    (a) IPSec encompasses three functional areas of authentication,confidentiality and privacy.

    (b) An IPSec implementation needs a database of SecurityAssociations used.

    (c) Transport mode provides protection to the entire IP packet.(d) IPSec is optional in IPv4.

  • 7/29/2019 88-590 - 2003 - Final Exam

    2/3

    2/3

    (e) The purpose of the dual signature is to link two messages thatare intended for two different recipients.

    (f) Firewalls cannot be categorized according to the layers of theInternet protocol stack at which they operate.

    (g) The PPTP, L2F, GRE, and L2TP are tunneling protocols.

    (h) SNMP was designed to be an application-level protocol.(i) SSL is an application-level security protocol.(j) The SSL Handshake Protocol operates on top of the SSL

    Record Protocol.

    Problem 4. A typical scenario for public-key distribution is illustrated in thefollowing diagram.

    (a) Describe this scheme, as steps marked in the figure.(b) What are the drawbacks, if any?

    Problem 5. In the following diagram, what are the role of an Acquirer and aPayment Gateway?

  • 7/29/2019 88-590 - 2003 - Final Exam

    3/3

    3/3

    December 2, 2003 ECE Dept. University of Windsor 4

    Secure Electronic Commerce Component

    Problem 6. The following diagram shows the role of SNMP as a networkmanagement protocol.

    (a) What are the basic components of SNMP?(b) What is a MIB?(c) What is a SNMP Trap?(d) What is the relationship among SNMPv1, SNMPv2, and SNMPv3?

    ManagementFunctions (FCAPS)

    Processes

    Appl ication

    AccessControl and

    User Interface

    Queries/ResponseAgent

    FunctionProcesses

    MIB

    Traps/Alarms

    ManagementStation

    ManagedDevice