computer security midterm 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/376

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:54 AM on 5/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

377 Terms

1
New cards

Q: What are the main categories of DNS defenses mentioned in the lecture?

A: Nameserver configuration general security practices protocol improvements DNSSEC DNS over HTTPS and DNS over TLS

2
New cards

Q: What is DNSSEC?

A: DNSSEC is a system that adds cryptographic signatures to DNS answers so resolvers can verify that the data is authentic and has not been altered

3
New cards

Q: Does DNSSEC provide encryption?

A: No DNSSEC provides integrity and authenticity but not confidentiality

4
New cards

Q: What does DNSSEC protect against?

A: DNSSEC helps protect against forged or modified DNS responses such as those caused by cache poisoning or man in the middle tampering

5
New cards

Q: What is an RRset in DNSSEC?

A: An RRset is a group of DNS records of the same name type and class that are signed together

6
New cards

Q: What key is used to sign DNS record sets in DNSSEC?

A: The Zone Signing Key or ZSK signs RRsets

7
New cards

Q: In what DNS record is the DNSSEC signature delivered?

A: The signature is delivered in an RRSIG record

8
New cards

Q: In what DNS record is the public Zone Signing Key delivered?

A: The public Zone Signing Key is delivered in a DNSKEY record

9
New cards

Q: What is the role of the Key Signing Key in DNSSEC?

A: The Key Signing Key or KSK verifies the Zone Signing Key and helps build the chain of trust

10
New cards

Q: How does the chain of trust work in DNSSEC?

A: The KSK verifies the ZSK the ZSK verifies the RRset and the parent zone stores a hash of the public KSK in a DS record

11
New cards

Q: What is stored in a DS record?

A: A DS record stores a hash of the child zone public Key Signing Key

12
New cards

Q: Why is the parent zone important in DNSSEC?

A: The parent zone publishes the DS record which links the child zone into the broader DNSSEC chain of trust

13
New cards

Q: What happens if the DNSSEC chain of trust is broken?

A: If the chain is broken an attacker may be able to meddle with responses because validation cannot be completed

14
New cards

Q: What is the purpose of the DNS root key signing process?

A: It establishes trust in the root of the DNSSEC hierarchy through a highly public and audited procedure

15
New cards

Q: Why is DNSSEC compared to HTTPS?

A: Both use chains of trust and public key cryptography to verify authenticity though DNSSEC is built into DNS and does not encrypt traffic

16
New cards

Q: What is CAA and how does DNSSEC help it?

A: CAA stands for Certification Authority Authorization and DNSSEC helps ensure the integrity of records that restrict which certificate authorities may issue certificates for a domain

17
New cards

Q: What is DANE?

A: DANE stands for DNS based Authentication of Named Entities and it uses DNS records to store certificate related information for verification

18
New cards

Q: What DNS record type is used by DANE?

A: DANE uses TLSA records

19
New cards

Q: How does DANE differ from the normal TLS trust model?

A: DANE can verify certificates using the DNS chain of trust instead of relying only on root certificate authorities in the operating system or browser

20
New cards

Q: What is SSHFP?

A: SSHFP is a DNS record that stores the fingerprint of an SSH host key

21
New cards

Q: How can SSHFP improve SSH security?

A: It lets a client verify an SSH server fingerprint through DNS instead of relying only on trust on first use

22
New cards

Q: Why has DNSSEC adoption been slow?

A: DNSSEC adoption has been slow because TLDs must be signed domain owners must coordinate with registrars and resolvers must validate signatures

23
New cards

Q: What three parties must cooperate for DNSSEC to work broadly?

A: The TLD the domain owner with registrar support and the resolver

24
New cards

Q: Why might HTTPS alone not be enough if DNS is compromised?

HTTPS fails if an attacker can both redirect you and present a valid certificate.

25
New cards

Q: What are some ways an attacker might still succeed despite HTTPS?

A: They might use a malicious or compromised certificate authority compromise a server and complete domain validation or break into a registrar dashboard and complete DNS validation

26
New cards

Q: How can poisoned DNS be used in certificate attacks?

A: An attacker may poison DNS to help falsely prove domain ownership during certificate issuance

27
New cards

Q: Why is using both HTTPS and DNSSEC better than using only one?

Using both HTTPS and DNSSEC is better because DNSSEC ensures you connect to the correct server, while HTTPS ensures that communication with that server is authenticated and encrypted.

28
New cards

Q: Why is DNSSEC useful for non web services?

A: DNS is used for many things besides web browsing such as mail routing SSH verification and DANE so DNSSEC protects the integrity of those records too

29
New cards

Q: What is an MX record?

A: An MX record specifies the mail server for a domain

30
New cards

Q: What is DNS over HTTPS?

A: DNS over HTTPS sends DNS queries to a resolver over HTTPS

31
New cards

Q: What security properties does DNS over HTTPS provide?

A: It provides confidentiality and integrity between the client and the recursive resolver

32
New cards

Q: Does DNS over HTTPS protect DNS data all the way to the authoritative server?

A: No it protects the connection between the client and the resolver

33
New cards

Q: Which public resolvers commonly support DNS over HTTPS?

A: Google Quad9 and Cloudflare

34
New cards

Q: Why might DNS privacy not always be expected traditionally?

A: DNS mainly reveals source and destination information which historically has not been treated as confidential in the same way as application data

35
New cards

Q: What is the chicken and egg problem mentioned with DNS over HTTPS?

A: TLS and HTTPS often depend on domain names even though DNS is needed to resolve those names in the first place

36
New cards

Q: How can that chicken and egg problem be worked around?

A: A certificate can be issued for an IP address such as 8.8.8.8 so the client can connect securely without first resolving a domain name

37
New cards

Q: What is DNS over TLS?

A: DNS over TLS sends DNS traffic directly over TLS without wrapping it in HTTP

38
New cards

Q: What is the main practical difference between DoH and DoT?

A: The main practical difference is the default port with DoH using port 443 and DoT using port 853

39
New cards

Q: Why can DoH blend in with other web traffic more easily?

A: Because it uses HTTPS on port 443 which is the same port used by regular secure web traffic

40
New cards

Q: Why are DoH and DoT often slower than traditional DNS?

A: They require TCP and TLS overhead instead of lightweight UDP based DNS queries

41
New cards

Q: What happens in a browser after entering a URL according to the lecture section shown?

A: Later stages include browser processing HTML parsing CSS interpretation page rendering GPU rendering and post rendering script execution

42
New cards

Q: What kinds of events can trigger JavaScript execution after rendering?

A: JavaScript can run on page load on a timer or in response to user interaction

43
New cards

Q: What is the user interface component of a browser?

A: It includes visible controls such as the address bar back buttons and other interface elements

44
New cards

Q: What is the browser engine?

the component that handles page navigation and coordinates between the UI, networking, and rendering.

45
New cards

Q: What is the rendering engine responsible for?

A: It determines how content is displayed by building structures like the DOM and render tree laying them out and painting them

46
New cards

Q: What does the networking component of a browser do?

A: It handles network requests using appropriate system calls

47
New cards

Q: What does the UI backend do in a browser?

A: It draws widgets and windows using appropriate system calls

48
New cards

Q: What does the JavaScript engine do?

A: It parses and executes JavaScript code

49
New cards

Q: What does browser data storage handle?

A: It interfaces with the file system or sandboxed local storage

50
New cards

Q: What does DOM stand for?

A: DOM stands for Document Object Model

51
New cards

Q: What is the DOM?

A: The DOM is a tree structure of objects created from parsed HTML tags

52
New cards

Q: Why is HTML parsing complicated?

A: HTML parsing must be forgiving and error tolerant and the page structure can change while the DOM is still being built

53
New cards

Q: Why can browsers begin layout before parsing is fully complete?

A: Browsers try to render progressively even though the DOM may still be changing

54
New cards

Q: What is the same origin policy?

A: The same origin policy is a browser security rule that restricts how a document or script from one origin can interact with resources from another origin

55
New cards

Q: What parts make up an origin?

A: An origin is defined by the scheme host and port

56
New cards

Q: Are two URLs with the same host but different ports the same origin?

A: No different ports mean different origins

57
New cards

Q: Are two URLs with the same host and port but different schemes the same origin?

A: No different schemes mean different origins

58
New cards

Q: Why does the same origin policy exist?

A: It prevents a malicious website from reading or manipulating sensitive data from another site loaded in the same browser

59
New cards

Q: What can a script generally do with resources from its own origin?

A: It can read modify and interact with them freely subject to normal page permissions

60
New cards

Q: What is one major thing blocked by the same origin policy?

A: It blocks JavaScript from reading data returned by a different origin unless that origin explicitly allows it

61
New cards

Q: Does the same origin policy stop a browser from sending requests to another origin?

A: No it mainly restricts reading the response not necessarily sending the request

62
New cards

Q: Why are cross origin requests still dangerous even if the response cannot be read?

A: They can still trigger actions on another site such as changing settings or submitting forms if other defenses are missing

63
New cards

Q: What is CORS?

A: CORS stands for Cross Origin Resource Sharing and it is a mechanism that lets a server specify which other origins may read its responses

64
New cards

Q: How does a server allow a cross origin read with CORS?

A: It returns specific headers such as Access Control Allow Origin

65
New cards

Q: What does the Access Control Allow Origin header do?

A: It tells the browser which origin is allowed to read the response

66
New cards

Q: What does it mean if Access Control Allow Origin is set to star?

A: It means any origin may read the response though credentials usually cannot be included with that setting

67
New cards

Q: What are credentials in a CORS context?

A: Credentials include cookies HTTP authentication and client certificates

68
New cards

Q: When are preflight requests used?

A: Preflight requests are used when a cross origin request is not considered simple such as when it uses certain methods or custom headers

69
New cards

Q: What HTTP method is usually used for a CORS preflight request?

A: OPTIONS

70
New cards

Q: What is the purpose of a preflight request?

A: It asks the server whether the actual cross origin request is allowed before sending it

71
New cards

Q: What header lists the intended method in a preflight request?

A: Access Control Request Method

72
New cards

Q: What header lists custom headers in a preflight request?

A: Access Control Request Headers

73
New cards

Q: What response header tells the browser which methods are allowed?

A: Access Control Allow Methods

74
New cards

Q: What response header tells the browser which headers are allowed?

A: Access Control Allow Headers

75
New cards

Q: What is a simple request in CORS?

A: A simple request is a cross origin request that uses an allowed method and only safelisted headers and content types so it does not need preflight

76
New cards

Q: Which methods are usually considered simple in CORS?

A: GET HEAD and POST

77
New cards

Q: Why are HTML forms important to understanding cross origin requests?

A: Browsers allowed cross site form submissions long before CORS so simple requests preserve older web behavior

78
New cards

Q: What is CSRF?

A: CSRF stands for Cross Site Request Forgery and it tricks a user browser into sending an unwanted authenticated request to another site

79
New cards

Q: Why can CSRF work even with the same origin policy?

A: Because the browser may still send the request with the user cookies even if the attacking site cannot read the response

80
New cards

Q: What is the main goal of CSRF defenses?

A: To ensure that a request came intentionally from the legitimate site and not from another site

81
New cards

Q: What is a CSRF token?

A: A CSRF token is a secret unpredictable value included in a request that the server checks before accepting sensitive actions

82
New cards

Q: Why is a CSRF token effective?

A: An attacker on another site usually cannot read the legitimate page to obtain the token

83
New cards

Q: What is the Referer or Origin header used for in CSRF defense?

A: It can help the server verify where the request came from

84
New cards

Q: What is a weakness of relying only on Referer checks?

A: Referer may be missing or altered in some situations so it is less reliable than tokens

85
New cards

Q: What is SameSite in cookies?

A: SameSite is a cookie attribute that limits when cookies are sent with cross site requests

86
New cards

Q: How does SameSite help against CSRF?

A: It can stop browsers from including cookies on some or all cross site requests

87
New cards

Q: What is the difference between SameSite Strict and SameSite Lax?

SameSite Strict never sends cookies on cross-site requests, while SameSite Lax allows cookies on top-level navigations like clicking a link but blocks them on most other cross-site requests

88
New cards

Q: Why is SameSite not always a complete CSRF defense by itself?

A: Older browsers compatibility issues and some allowed request types can still leave gaps

89
New cards

Q: What is JSONP?

A: JSONP is an older technique that bypasses same origin restrictions by loading data as a script

90
New cards

Q: Why is JSONP risky?

A: It treats returned data as executable JavaScript which can be dangerous and is less safe than CORS

91
New cards

Q: Why are script tags special with cross origin loading?

A: Browsers allow scripts to be loaded from other origins and executed even though reading response bodies through JavaScript is normally restricted

92
New cards

Q: What is clickjacking?

A: Clickjacking tricks a user into clicking on something different from what they think they are clicking often by hiding or overlaying frames

93
New cards

Q: How can a site defend against clickjacking?

A: It can use frame restrictions such as X Frame Options or a Content Security Policy frame ancestors rule

94
New cards

Q: What does X Frame Options do?

A: It tells the browser whether the page may be displayed inside a frame

95
New cards

Q: What is postMessage used for?

A: postMessage lets documents from different origins communicate safely when both sides check the sender origin carefully

96
New cards

Q: Why is origin checking important with postMessage?

A: Without checking origin a page might trust messages from a malicious site

97
New cards

Q: What is document.domain and why is it notable?

A: document.domain is an old mechanism for relaxing origin checks between related subdomains but it is discouraged because it weakens security

98
New cards

Q: What is one key difference between CORS and CSRF defenses?

A: CORS controls which sites may read responses while CSRF defenses control which requests may cause authenticated actions

99
New cards

Q: Why is allowing Access Control Allow Origin for every site sometimes dangerous?

A: It can expose sensitive response data to any website if other protections are not in place

100
New cards

Q: What is a common mistake when enabling credentialed CORS?

A: Allowing credentials while reflecting arbitrary origins can let untrusted sites read authenticated data