FA20 COMPSCI 642 001
(Review Questions) Netowrk Security
Skip To Content
Dashboard
  • Login
  • Dashboard
  • Calendar
  • Inbox
  • History
  • Help
Close
  • My Dashboard
  • FA20 COMPSCI 642 001
  • Assignments
  • (Review Questions) Netowrk Security
Fall 2020-2021
  • Home
  • Assignments
  • Files
  • Syllabus
  • Quizzes
  • Modules
  • Library Dashboard
  • Top Hat
  • NameCoach Roster
  • Kaltura Gallery
  • Zoom

(Review Questions) Netowrk Security

  • Due No Due Date
  • Points 0

TLS and Certificates

  1. Which of the following security goals are addressed by the HTTPS protocol: (a) integrity, (b) confidentiality, (c) authenticity?
  2. Can I get a certificate for visa.com from VeriSign? How do signing authorities verify identity? 
  3. OCSP stapling is to get signed timestamp for a certificate from the CA, Sign_sk(CertSerial#, ts), where sk is the CA's secret key. How should the browser verify a OCSP stapled certiticate?
  4. TLS is said to be a one-way autnetication because the client does not authenticate to the server. How does two-way authenticate works in the internet?
  5. Certificate is a signature over the public key and a domain name.LaTeX: s_0 = \left(n_0, pk_0, \text{Sign}_{sk_0}(n_0\|pk_0)\right)\;\;  \text{Certificate of } C_0 \text{, Trusted CA}\\
s_1 = \left(n_1, pk_1, \text{Sign}_{sk_0}(n_1\|pk_1)\right)\;\;  \text{Certificate of } C_1 \text{, Subsidiary CA}\\
s_2 = \left(n_2, pk_2, \text{Sign}_{sk_1}(n_2\|pk_2)\right)\;\;  \text{Domain certificate}\\
    How will a domain verifices the ceritficate chain LaTeX: (s_0, s_1, s_2)? Assume there is a function Verify. Which key --- private or public --- do you need to create a certificate?
  6. Why do certificates have expiry? What is the point of having additional information (Country, address, street, etc.) in certificate?
  7.  

DNS, BGP, ARP

  1. What capabilities of the attacker is required to mount a DNS cache poisoning attack? How does it work? To mount DNS cache poisoning the attacker has to get two things right. What are they?
  2. BGP and ARP what are the differences? 
  3. Can SYN flood attack be reflective?
  4. DDoS occur when a large pool of compromised devices attack a target.
0
Please include a description
Additional Comments:
Rating max score to > pts
Please include a rating title

Rubric

Find Rubric
Please include a title
Find a Rubric
Title
You've already rated students with this rubric. Any major changes could affect their assessment results.
 
 
 
 
 
 
 
     
Can't change a rubric once you've started using it.  
Title
Criteria Ratings Pts
This criterion is linked to a Learning Outcome Description of criterion
threshold: 5 pts
Edit criterion description Delete criterion row
5 to >0 pts Full Marks blank
0 to >0 pts No Marks blank_2
This area will be used by the assessor to leave comments related to this criterion.
pts
  / 5 pts
--
Additional Comments
Total Points: 5 out of 5