Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
,
". - .,. t c.. on /2943-05._,
(a) What is the security purpose for the fields, such as sequence number '.of
an IPSec packet ?
(b) UNDO is a recovery operation for databases. It is a command that
obtains information from a transaction log and resets the elements of a
database to their values before a particular transaction is performed.
Describe a situation in wryich an UNDO command would be useful.
(c) Explain why asynchronous I/O activity is a problem with many memory
protection schemes, including base/bounds and paging. Suggest a
solution to the problem.
I Ie) (b)
(c)
(b)
(a)
(a) Comparison between Lj nk and End-to-End encryption in terms of security
within hosts, Role of user and implecentation concerns.
Explain secure E-mail systems with examples.
List the characteristics of a good firewall implementation. What are
the limitations of a firewall?
Ii
What is the IP spoofing attack ? I'v'hy is it
not easy to detect IP
spoofing attacks?
What is the Denial of Service (DOS) attack? What is the meaning of the
term 'service' in DOS? Hhat can possibly>prevent DOS attacks ?
Explain the term 'Risk Analysis'. List the basic steps of risk
analysis.