Final Exam, CSCI 277, Spring 2022


  1. SQL Injection
    1. [3 points] Describe the environment when a SQL injection can occur.
    2. [2 points] Describe how a SQL injection attack can be mitigated.
  2. Fake Email/SPAM
    1. [2 points] What principle makes spam email effective?
    2. [3 points] Name three different purposes for sending fake email.
    3. [2 points] Why is it not reasonable to rely on email header information?
    4. [3 points] What is phishing and spear phishing?
  3. OS Basics
    1. [2 points] What is an operating system?
    2. [3 points] Name or describe three distinct tasks an operating system performs.
  4. OS Security
    1. [3 points] Name/Describe three different layers in a operating system.
    2. [2 points] Describe how authentication spans multiple levels of the operating system.
    3. [5 points] Describe the particular security challenges introduced by device drivers. This discussion should involve material presented in class or chapter 5 of the book.
  5. Virtualization
    1. [2 points] What is virtualization?
    2. [3 points] How can virtualization make a system more stable?
    3. [2 points] What is a honeypot?
    4. [3 points] How can a honeypot be employed in cybersecurity?
  6. For me, at least, a recurring theme throughout the course has been "Keep up to date".
    1. [2 points] Name two distinct "things" that a computing professional should keep up to date to enhance cybersecurity.
    2. [3 points] Why is it important that the computing professional keep these "things" up to date?
  7. [5 points] Is cybersecurity a problem that will ever be solved? Why or why not?