📝 Mock Examination B
Question 1: Authentication
(a) Compare Hashing vs. Encryption.
- Which one is reversible?
- Which one is used for storing passwords?
- Which one is used for ensuring data confidentiality during transit? [5 marks]
(b) Explain the “Downgrade Dance” in the context of the POODLE attack on SSL v3.0. How does an attacker force a modern browser to use an insecure protocol? [5 marks]
(c) In a Phishing attack, list three common “Indicators of Compromise” (red flags) that a user might spot in a malicious email. [5 marks]
Question 2: Public Key Infrastructure (PKI)
(a) Alice wants to digitally sign a document to prove it came from her.
- Which key does she use to sign the hash?
- Which key does Bob use to verify the signature?
- If Bob successfully verifies the signature, what two security properties have been achieved? (e.g., Confidentiality, Integrity, Non-repudiation). [6 marks]
(b) A Root Certificate Authority (CA) is compromised.
- What is the impact on the “Chain of Trust” for all certificates signed by this CA?
- What mechanism (acronym: CRL or OCSP) allows browsers to reject these now-invalid certificates? [4 marks]
(c) RSA Calculation: Given and .
- Calculate the modulus .
- Calculate Euler’s Totient .
- If we choose public exponent , find the private exponent such that . [10 marks]
Question 3: Network Security
(a) Analyze the diagram below (Text Description):
- Zone A: Contains the Database Server and Employee Workstations.
- Zone B: Contains the Public Web Server and Email Relay.
- Zone C: The Internet.
- Which Zone represents the DMZ?
- Where should the Firewalls be placed? (Between which zones?)
- If the Web Server in Zone B is compromised, what prevents the attacker from immediately accessing the Database in Zone A? [8 marks]
(b) Compare IDS (Intrusion Detection System) and IPS (Intrusion Prevention System).
- Which one is “Passive” and which is “Active”?
- Which one introduces a risk of blocking legitimate traffic (False Positives) that causes a denial of service? [7 marks]
Question 4: Attacks & Defense
(a) A user is logged into their banking website. They open a new tab and visit a malicious site which contains a hidden form that submits a “Transfer Money” request to the bank.
- Name this attack.
- Explain why the bank accepts the request (Hint: Cookies).
- What specific token can the bank implement to prevent this? [8 marks]
(b) Block Cipher Modes:
- Why is ECB (Electronic Codebook) mode considered insecure for encrypting images or large files?
- What is the purpose of the IV (Initialization Vector) in CBC mode? [7 marks]