TU Wien:Foundations of System and Application Security VU (Lindorfer)/Exam 2026-01-22

Aus VoWi
Zur Navigation springen Zur Suche springen

Single Choice Questions[Bearbeiten | Quelltext bearbeiten]

(2P) IoT Protocols[Bearbeiten | Quelltext bearbeiten]

  

1 CoAP is based on the REST architectural style and mainly utilizes UDP as the underlying transport protocol for lightweight and efficient communication.

2 In CoAP Pre-Shared Key (PSK), asymmetric keys are used for encryption, which are distributed in-band.

3 XMPP does not support end-to-end encryption without extensions.

4 During a DVB injection attack, a malicious actor replaces the HbbTV URL in the Application Information Table (AIT) and remodulates the signal to target the victim TV.


(2P) MQTT[Bearbeiten | Quelltext bearbeiten]

  

1 Retained messages are stored by the broker and sent to all topics when a new client connects.

2 Will messages are stored by the broker and sent when the client who created the message abruptly disconnects.

3 MQTT uses a peer-to-peer architecture where devices communicate directly.

4 MQTT does not require, but supports, authentication mechanisms using user-names and passwords.


(2P) Networks[Bearbeiten | Quelltext bearbeiten]

  

1 Eavesdropping on a wired connection can only be achieved with special hardware.

2 Virtual LAN tagging (VLANs) can be used to create separate broadcast domains on the same hardware.

3 Any IPv4 address in the 127.0.0.0/8 range, such as 127.0.0.53, is reserved for loopback communication.

4 f1f1::2::53 is a valid IPv6 address for link-local communication.


(2P) TLS[Bearbeiten | Quelltext bearbeiten]

  

1 TLS guarantees confidentiality, integrity, and availability (all three aspects of the CIA triad).

2 A program can use its own bundle of root certificates as its trust anchor, instead of relying on the operating system.

3 The cipher suite used for a connection is negotiated between the client and server during the TLS handshake.

4 To validate certificates, a chain of signatures needs to be established to a trust anchor (such as root certificates).


(2P) Malicious Software[Bearbeiten | Quelltext bearbeiten]

  

1 Malware that self-replicates automatically over the network is called a worm.

2 Malware that aims to encrypt user data is called a rootkit.

3 Domain-generation-algorithms (DGAs) are used by malware to evade domain-based detection and filtering.

4 Honeypots must be placed outside the network firewall and cannot be deployed inside a DMZ or internally.


(2P) Threat Modelling and CVE IDs[Bearbeiten | Quelltext bearbeiten]

  

1 Threat modelling is a process that should be repeated regularly.

2 Defining a scope for threat modelling is a step that can be skipped to directly determine threats.

3 CVE IDs are only assigned by the vendor of the affected software or hardware.

4 Using CVE IDs allows organizations to track vulnerabilities across multiple systems and products efficiently.


Free-Text Questions[Bearbeiten | Quelltext bearbeiten]

(2 Pts.) The OWASP IoT Top 10 contains I4: Lack of Secure Update Mechanism. Give an example of this vulnerability and describe which protection measures can be used to avoid it[Bearbeiten | Quelltext bearbeiten]
(2 Pts.) List and briefly explain two ways how malicioius actors can monetize infected devices[Bearbeiten | Quelltext bearbeiten]
(2 Pts.) When using the Tor Browser, it typically first fetches the current list of known Tor nodes and then builds a so-called "circuit" - a sequence of three nodes used to access web resources privately. Explain briefly what benefit an attacker would have if the entry node (guard) chooses the circuit instead of the client and how they can use it do de-anonymize a Tor user.[Bearbeiten | Quelltext bearbeiten]
(2 Pts.) In threat modeling, an identified threat can be acceptedd, eliminated, mitigated or transferred. Explain the difference between risk elimination and risk mitigation and include an example for each of the two[Bearbeiten | Quelltext bearbeiten]