CS代考 COMPSCI 5063

Tuesday 10 May 2022 09:30-11:30 BST Duration: 2 hours Additional time: 30 minutes Timed exam – fixed start time
DEGREES OF MSc, MSci, MEng, BEng, BSc,MA and MA (Social Sciences)
Cyber Security Fundamentals M COMPSCI 5063
(Answer All 3 Questions)

Copyright By PowCoder代写 加微信 powcoder

This examination paper is an open book, online assessment and is worth a total of 60 marks.

You are working as a police officer and are conducting an investigation into a cyber-crime.
One of the pieces of evidence gathered is a notepad which you are going through. On the last page there is a note that stands out as it does not make any sense. You start thinking that it might be referring to ciphers and decide to attempt to break them. (In order for you to get full marks you will need to demonstrate the whole procedure and mention which ciphers are being used).
[15 marks]
7 marks for every correct conversion and 1 mark for clear explanation and answer to the questions posed.
Note: 1st: 2→(to the right)
2nd: passwd (keywd)→ZCGNFJXQX
On a different page of the notepad you find the following: DB Password = ASECRETMESSAGE. You try ASECRETMESSAGE as a password, but it does not work. There is a chance this is a clue to derive the password through substitution of characters. Please state at least 3 different passwords deriving from this information and in comparison, with password setup guidelines discussed in the course defend the level of strength that these passwords you think provide. Your answer should not exceed 250 words.
2 marks for the list of three potential passwords and 3 marks for discussing different factors that affect the strength of a password alongside with a comparison to your findings.
[Total: 20 marks]
A company is concerned about the level of information they have available online.
Is there any type of penetration testing that can be considered realistically possible with a duration of 2 weeks? Your answer should not exceed 200 words.
From Figure 1 & 2 (next page) can you extract at least three pieces per figure of vital information and explain how an attacker might use them in a malicious way (3 pieces of information for each image; 6 in total)? Your answer should not exceed 700 words.
[12 marks]
April- 1 Continued overleaf/

Figure 1: “Example a”
Figure 2: “Example b”
(c) Can you mention some of the tools that could produce similar results as figure 1 & 2 (figures seen in previous question)? Your answer should not exceed 150 words.
April- 2 Continued overleaf/

(d) Figure 3 (below) shows an output from a different tool. Describe how this output differs from that shown in figure 1 & 2 (figures seen in question 2b). Your answer should not exceed 200 words.
Figure 3: “Scan example”
If an attacker had all this information, how could they use it for exploitation? Please describe two scenarios. Your answer should not exceed 250 words
[Total: 25 marks]
A computer science student regularly works from home, using their computer to access remote machines on campus to run code, download papers from web archives, send email and upload files to the university fileserver.
What services and ports would you expect the student to use (you need to mention at least five)? Your answer should not exceed 650 words.
[11 marks]
Describe two potential attack scenarios the student may be vulnerable to, based upon the information gathered in Q3a including. Your answer should not exceed 300 words.
[Total: 15 marks]
April- 3 /END

程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com