ASU CSE 548 Advanced Computer Network Security
Week 7 Graded Quiz
1 In order for the SDN controller to change the security functions, it needs
to interact with which network component?
• OVS ✔
• Bridge
• VPN
• Vlan
2 In an anomaly detection model, which metric is used to tell us how good
or bad a particular model is?
• False Negative
• False Positive
• Confusion Matrix ✔
• Recall
3 Which of the following is used to calculate the exploitability score?
• Confidentiality
• Access Vector ✔
• Access Mechanism
4 What does the intrusiveness of a countermeasure mean?
• It is an indication of when and where the countermeasure is applicable
• It is the negative effect that the countermeasure will have on a service ✔
• It specifies the change in the probability of the node to which the countermeasure is applied
5 ”Consists of information that helps in identification of SFP for SFC
aware traffic” is the definition of what?
• Rendered Service Path (RSP)
• Service Function Path (SFP)
• SFC Encapsulation ✔
1
Week 7 Graded Quiz
1 In order for the SDN controller to change the security functions, it needs
to interact with which network component?
• OVS ✔
• Bridge
• VPN
• Vlan
2 In an anomaly detection model, which metric is used to tell us how good
or bad a particular model is?
• False Negative
• False Positive
• Confusion Matrix ✔
• Recall
3 Which of the following is used to calculate the exploitability score?
• Confidentiality
• Access Vector ✔
• Access Mechanism
4 What does the intrusiveness of a countermeasure mean?
• It is an indication of when and where the countermeasure is applicable
• It is the negative effect that the countermeasure will have on a service ✔
• It specifies the change in the probability of the node to which the countermeasure is applied
5 ”Consists of information that helps in identification of SFP for SFC
aware traffic” is the definition of what?
• Rendered Service Path (RSP)
• Service Function Path (SFP)
• SFC Encapsulation ✔
1