Here is a detailed answer for Q2 (total 10 marks) from your Secure Software
Design and Enterprise Computing mid-semester exam:
---
Q2 (a) What are software vulnerabilities? How are they identified? (2 marks)
Definition:
A software vulnerability is a flaw, weakness, or misconfiguration in software
code or logic that can be exploited by attackers to compromise system
security.
Common Vulnerabilities:
SQL Injection
Cross-Site Scripting (XSS)
Buffer Overflows
Broken Authentication
Insecure Deserialization
Identification Methods:
1. Static Application Security Testing (SAST):
Scans source code without running it.
Detects code-level issues early in development.
Example tools: SonarQube, Fortify.
2. Dynamic Application Security Testing (DAST):
Analyzes a running application.
Finds runtime issues such as XSS, CSRF.
Tools: OWASP ZAP, Burp Suite.
3. Software Composition Analysis (SCA):
Identifies known vulnerabilities in open-source libraries.
Tools: Snyk, Black Duck.
4. Penetration Testing:
Manual or automated simulation of real attacks to find exploitable flaws.
5. Manual Code Reviews:
Security experts inspect source code for design flaws or insecure logic.
---
Q2 (b) What is DHCP and how does it simplify IP address management in
large networks? (3 marks)
Definition:
DHCP (Dynamic Host Configuration Protocol) is a network protocol used to
automatically assign IP addresses and other network configuration details
(e.g., subnet mask, gateway, DNS) to devices in a network.
How it Works:
1. Client Broadcasts Request: When a device joins a network, it sends a
DHCPDISCOVER request.
2. DHCP Server Responds: Offers an IP address with a DHCPOFFER.
3. Client Accepts: Sends a DHCPREQUEST.
4. Server Confirms: Sends a DHCPACK with assigned IP and configuration.
Advantages in Large Networks:
Automated IP Management: Reduces manual configuration effort.
Avoids IP Conflicts: Tracks and assigns unique IPs.
IP Leasing: Frees up unused IPs by assigning them temporarily.
Scalability: Handles thousands of devices without admin intervention.
Example: In a university campus, DHCP assigns IPs to all student laptops
without manual setup.
---
Q2 (c) (Option 1): Explain a directory service and how does Active Directory
facilitate centralized management in an enterprise network? (5 marks)
What is a Directory Service?
A directory service is a network service that stores, organizes, and provides
access to information about users, computers, and other resources.
Active Directory (AD):
AD is Microsoft’s directory service that enables:
Centralized Authentication: Users log in from any system using a single
account.
Resource Management: Admins manage computers, printers, folders, etc.
Group Policy Management: Enforces security and operational policies (e.g.,
password strength, software restrictions).
Hierarchy: Organizes resources into domains, trees, and forests.
Key Features:
User and Group Management
Organizational Units (OUs) for delegation
Access Control with ACLs
LDAP Protocol support
Example Scenario:
In a corporate office, AD:
Allows HR staff to access HR systems only.
IT admins can reset passwords and manage software deployment for all
departments.
Automatically locks out users after failed login attempts.
---
OR
Q2 (c) (Option 2): Describe the process of installing and configuring a DNS
server in a corporate environment. What key settings need to be defined? (5
marks)
What is DNS?
DNS (Domain Name System) translates human-readable domain names (like
intranet.company.com) to IP addresses.
Installation Steps:
1. Install DNS Server Role: On Windows Server (via Server Manager) or Linux
(e.g., BIND).
2. Create DNS Zones:
Forward Lookup Zone: Resolves domain names to IPs.
Reverse Lookup Zone: Resolves IPs to domain names.
3. Define DNS Records:
A (Address) Record: Maps a domain to an IP.
MX (Mail Exchange): Points to mail servers.
CNAME (Alias): Maps one domain name to another.
4. Configure Forwarders: Use external DNS for queries not in internal zone.
5. Enable Logging and Security: Set ACLs and logging for audit.
Key Settings to Define:
Primary or Secondary Role
Zone Transfer Permissions
Time-to-Live (TTL) Values
Dynamic Updates
Root Hints or Forwarders
Example Use in Company:
Employees can access finance.company.com without memorizing IPs. DNS
also helps configure internal email and domain-based logins.
---
Let me know if you'd like a diagram or example configuration for DHCP, AD,
or DNS.