Test II, CSCI 277, Spring 2022


  1. Public Key Private Key Encryption
    1. [3 points] What is a private key and who should know this key?
    2. [3 points] What is a public key and who should know this key?
    3. [3 points] What is a Certification Authority and what role does such an entity fill?
    4. [3 points] In a public key/private key system, describe how Bob can send a private message to Alice that no one else can read, yet Alice is confident that the message came from Bob?
    5. [3 points] Why is it not reasonable to employ public key/private key encryption for all secure communications?
  2. Buffer Overflow
    1. [3 points] What programming error does a buffer overflow exploit?
    2. [3 points] What are the basic steps in exploiting this vulnerability?
    3. [4 points] Name four different approaches to mitigating buffer overflow vulnerabilities.
  3. Other Programming Errors
    1. [points 3] Describe the Time-of-Check vs Time-Of-Use problem.
    2. [points 2] Why would a programmer insert an undocumented access point (back door) into a program?
  4. Malware Terms
    1. [9 points] List and describe each of the three major classes of malware. Your descriptions should provide sufficient detail to distinguish between the three.
    2. [2 points] What is a zero-day exploit?
  5. Malware Impact
    1. [3 points] Name three different economics impacts from malware.
    2. [3 points] Name three different methods used to spread malware.
    3. [3 points] What is a virus detector and how does it work?