Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

COM-301 Midterm

Rating
-
Sold
-
Pages
9
Grade
B
Uploaded on
20-11-2022
Written in
2022/2023

Computer Security 22/23 Midterm

Institution
Course

Content preview

COM 301 Midterm Exam, 10.11.2022



Name: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .



Sciper: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .


Please wait for instructions before opening this document
• This is a closed book exam. Books, notes, and electronic devices are not allowed.

Multiple choice questions:
• Multiple-choice questions can have multiple correct answers. You need to mark all answers that
are correct, and only those that are correct to receive the point.
• To mark a correct answer, make a mark inside the box corresponding to your answer. Outside
marks will not be graded
• Use a black or blue pen to mark your answers. Pencils are not allowed.

Open text questions:
• Please write your answers in the corresponding text boxes.
• Do not write more than the lines specified in the box. Any text outside of the boxes will be
ignored.
• Do not tick the grading boxes of the top of the text boxes.
• Please mind your calligraphy; undecipherable responses will not be graded.

Questions
• The supervisors will not answer any questions regarding the content of the exam questions
Reserved for grading, please leave blank!
Multiple choice questions Total

/ 6 pts
Open text questions Parts Total
Hiding the Horcruxes / 2 pts
Battle Night / 2 pts
NovemberFest / 2 pts
Geletram / 2 pts
Crazy Love / 2 pts
Life at the Vortex / 2 pts
Total / 18 pts


1

, Question 1 [Security Principles] Rob accidentally downloaded a malware that leverages ambient
authority. That malware uploaded all Rob’s files (both on their laptop and accessible as shared folders)
to a cloud. The company discovers later that during the same leak, documents in other departments,
that Rob was not working on, also got leaked due to the malware. Which security principle(s) were
incorrectly applied by the company’s system administrators that manage the shared folders and allowed
the full leak ?

Fail-Safe Default
Least Privilege
Psychological Acceptability
Separation of Privilege

Question 2 [Access Control] Which of the following are true about Access Control Lists?

They associate permissions to subjects.
It is easy and efficient to determine a given user’s permissions on all files.
They associate permissions to objects.
It is easy and efficient to revoke rights by resource.

Question 3 [Access Control] MAC stands for Mandatory Access control in this question with levels
secret < top secret. Which of the following statements are true?
A system designed using MAC automatically follows the least privilege principle.
MAC and DAC cannot coexist within the same system.
BLP does not guarantee that top secret information cannot be accessed by the lowest clearance
subjects.
In MAC, owners can delegate access to a document to any user.

Question 4 [Symmetric Cryptography] In symmetric cryptography, there are two types of ciphers:
stream ciphers and block ciphers. Block ciphers have different modes of operation. Which of the following
statements are true?

When using a block cipher in ECB mode, the encryption of a block does not include information
from any other block.
CTR mode is not secure if the nonce is reused under two different keys.
When using a stream cipher, both the key and the initialization vector (IV) must be kept secret.
CBC mode is not secure if the IV is reused under the same key.

Question 5 [Cryptography] Which of the following statements are true?

Encrypt(key, m) = c, where c is a random string, is not a valid form of encryption that provides
confidentiality.
All encryption schemes guarantee that the risk that an adversary without the secret key can read
the plaintext is 0.
Applying twice a hash function, i.e., hash(hash(m)) is less secure than applying it only once.
In digital signatures, the secret key is used to verify the signature given a message.




2

Written for

Course

Document information

Uploaded on
November 20, 2022
Number of pages
9
Written in
2022/2023
Type
Exam (elaborations)
Contains
Answers

Subjects

$10.29
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
rubenbento

Get to know the seller

Seller avatar
rubenbento Universidade de Coimbra
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
7 year
Number of followers
0
Documents
1
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions