TU Wien:Introduction to Security VU (Weippl)/Prüfung 2013-01-15

From VoWi
Jump to navigation Jump to search

Also für das midterm-retake exam kamen folgende Fragen:


What is the difference between passive and active threats?

List 3 uses of public-key encryption

What are disadvantages to database encryption?

Describe the differences between a host-based IDS and a network-based IDS

What is the difference between a bot and a rootkit?

What is a NOP-sled and how is it used in a bufferoverflow attack?

What defences are possible against TCP SYN spoofing attack?

What steps should be taken when a DoS attack is detected?

What are some weaknesses of a packet filtering firewall?

What is a DMZ network and what types of systems would you expect to find on such networks?

Define a cross-site scripting attack. List an example of such an attack.

what is a hash-function, what is it used for? Give an example