Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

TRUE/FALSE QUESTIONS: 1. Programmers use trapdoors legitimately to debug and tes

ID: 3804905 • Letter: T

Question

TRUE/FALSE QUESTIONS:

1.   Programmers use trapdoors legitimately to debug and test programs.

2.   If the compromised machine uses encrypted communication channels, then just sniffing the network packets on the victim’s computer is useless because the appropriate key to decrypt the packets is missing.   

3.   There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program.

4.   Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values.

5.   The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC) access to require authentication.

Explanation / Answer

1. True : Trapdoors are the secret gateway into the program that allows someone who is aware of trap doors to gain access without going through actual security access procedures.From many years programmers use these trap doors doors.It becomes threat when some unprincipled programmer use them for gaining unauthorized access.

2. True : This is known as keyloggging , but by using keylogger attacker can access the sensitive information.

3. True : The Fuzzing technique has been developed to overcome the above problem .This a software testing technique that uses randomly generated data as an input.

4. True : The above condition occurs because of improper management of access to common shared memory by several threads or process with in the same process. It causes the race condition which is the well known issue when writing concurrent code.

5.True :In Windows XPSP2 Microsoft made important change to RPC services. It was split into two to allow it to execute distributed COM on remote computer correctly , but raw RPC traffic doesnot require such priviliges. So RPCSS was rearchitectured into components.