SlideShare a Scribd company logo
1 of 9
Database, Internet, and Systems
Integration Technologies
For more information,
Visit: https://www.liveexamhelper.com/
Contact: +1 678 648 4277
Mail us at: info@liveexamhelper.com
Live Exam Help
An airline operates a set of flights. A flight has a flight number, an origin airport and a destination airport. All flights
operate daily. When a passenger books a ticket, the airline registers their name, and assigns them a specific seat on a
flight on a departure date. Assume all simple types are #PCDATA, except airports, which are either “BOS”, “SJU”,
“SFO”, “JFK”, “DCA” or “MAD”.
1. Write a DTD file for the airline’s set of flights and passenger info. The first line is provided. You may wish to draw
a data model and write the XML file (part 2) first.
Solution:
<?xml version="1.0" encoding="iso-8859-1"?> (PROVIDED)
<!ELEMENT flightlist (flight+)>
<!ELEMENT flight (passengers+)>
<!ATTLIST flight
number #PCDATA
origin ("BOS"|"SJU"|"SFO"|"JFK"|"DCA"|"MAD")
dest ("BOS"|"SJU"|"SFO"|"JFK"|"DCA"|"MAD")>
<!ELEMENT passengers (passenger+)>
<!ATTLIST passengers
date #PCDATA >
<!ELEMENT passenger EMPTY>
<!ATTLIST passenger
name #PCDATA
seat #PCDATA >
Live Exam Help
2. Write an XML file that conforms to the DTD that you created in the previous step. Create 2 flights on 2 dates
with 2 passengers per flight.
Solution:
a. XML File
<flightlist>
<flight number=”1” origin=”BOS” dest=”SJU”>
<passengers date=”12-4-2012”>
<passenger name=”Laura” seat=”1A”/>
<passenger name=”Anna” seat=”1B”/>
</passengers>
<passengers date=”12-5-2012”>
<passenger name=”Tatiana” seat=”1C”/>
<passenger name=”Candy” seat=”1D”/>
</passengers>
</flight>
<flight number=”2” origin=”SFO” dest=”JFK”>
<passengers date=”12-4-2012”>
<passenger name=”Charlie” seat=”1A”/>
<passenger name=”Ivan” seat=”1B”/>
</passengers>
<passengers date=”12-5-2012”>
<passenger name=”Dan” seat=”1C”/>
<passenger name=”Li” seat=”1D”/>
</passengers>
</flight>
</flightlist>
Live Exam Help
b. How will the airline alter the tag names when sending XML to a partner airline, if a partner’s XSD or DTD is slightly
different for a request or response?
XSLT
c. Can the XML file be sent as a Web service response to a request? What are the parameters in the request?
Yes; flight number& airports can serve as parameters
d. Your airline sends just XML documents to each gate at each airport. What XML standard must a manager at an
airport use to display the XML that is sent, so he or she can read it formatted well in a browser?
XSLT to style the XML and present it in their browser
e. Your airline is expanding to several airports in Africa, each served by a VSAT terminal with a bandwidth of 9.6 kbps.
You send 500 XML messages per hour to each airport; there are many changes in reservations and connections. The
XML messages use the format you defined in part (2a) above, and contain 1200 characters (bytes) on average. This
XML message traffic is 90% of the traffic on these VSAT links. Will a VSAT link provide sufficient bandwidth to an
airport? If not, suggest changes that would make this workable.
500 messages times 1200 bytes per hour = 600,000 bytes per hour= 4,800,000 bits per hour/ 3600 seconds/hr=~
1300 bits/second = 1.3 kbps. This is satisfactory.
f. Should your African airports validate each XML message against the DTD published on your Web site, by getting the
DTD from the Web site for each message received, or is there a simpler procedure that is acceptable?
The airport does not need to get the DTD afresh for every message. It can check the main airline site’s DTD once a
day to see if there is an update.
Live Exam Help
g. What technology would you use if you were in the same city as the VSAT carrier and you wanted to do this at
lowest cost? The VSAT carrier has access to the open Internet and also subscribes to a carrier’s Metro Ethernet
service, which would cost you $3,000 per month to use and provides 1 Gbps. You are two miles from a central office
that offers a wide range of data services, and you are served by a CATV company that offers data services at your
location. The telco (central office), CATV and open Internet services cost about $300 per month for 1.5 Mbps
DSL or cable modem, with a VPN tunnel, over the open Internet
In question (g), what security measures would you use? Briefly justify.
Carrier Ethernet would provide security without any further action on your part. To use DSL or CATV over the
Internet, you must provide security. A VPN tunnel will encrypt your traffic. In all cases, you must secure your Web
site and against attacks: use SSL, strong passwords, certificates.
i. Does each African airport need a Web server for its end of these transactions? An app server? A database server?
Explain why or why not. All applications used by any airport are provided from the airline’s main data center and
are accessed via Web browsers.
No servers needed at airport. All apps are accessed using just a client (Web browser).
j. Does each African airport need a load balancer? A firewall? A router? Explain why or why not.
Load balancer: no. Firewall: yes, next to (or integrated with) the router, and on each client, for security, just as
you have on your personal laptops. Router: yes, for routing packets from the VSAT service to the computers on
the airline’s LAN at the airport.
Live Exam Help
k. The CATV carrier serving one of the African airports offers you dedicated use of one 6 MHz CATV channel over
which you can run Ethernet between the airport terminal and your maintenance facility on the other side of the
airport. The signal-to-noise ratio of this channel is 27; the maximum utilization for Ethernet is 50%. What is the
bandwidth, in megabits per second (Mbps), of this channel? Would this be sufficient to stream 4 MPEG-2 (6 Mbps)
high-quality security video feeds between the terminal and the maintenance facility?
6 MHz * 27/3 * 0.50= 27 Mbps. This is sufficient to handle 4 6 Mbps streams, which are 24 Mbps.
Live Exam Help
3. Medical Supply Chain Security
a. Outline how an attack can be launched against a user with a laptop at an Internet café who logs into a medical
supply chain Web site from an http (not https) home page, even if all subsequent pages are https (SSL) pages.
Man in the middle attack. Hacker intercepts username/login from user to Web site, and uses it to log in his/her
computer. He/she then relays pages between Web site and user, while possibly getting identity information,
transferring funds, etc.
b. Suppose the supply chain companies form a consortium to issue password generator cards that create a new 8
digit passcode every 30 seconds (e.g., Secure-ID) to all their employees. The employee must enter this 8 digit code
as part of their password. (There is also a fixed password that the employee chooses and enters, as usual.) They
leave their home pages as before (http, but with all pages after login as https). Does this combat the attack in part a
above?
No. Hacker intercepts the username/password as before (including the Secure-ID portion) and attacks as before.
c. What new vulnerability, if any, has the consortium introduced in part b above?
Supply chain companies must share the Secure-ID server key, since they all must be able to check all Secure-ID
card generated passwords. Having to share this secret increases exposure.
d. Some of the password generator cards are stolen, or not returned by employees who leave their companies. Is
this a security risk? Briefly give your reasons pro or con. If it is a risk, describe at least one attack that can be
executed with a stolen password generator card.
These are invalid cards and there is little risk in distributing a list of them.
Live Exam Help
4. Truck at a Security Gate
a. Write the protocol notation for the following security system: (5 points)
•Truck pulls up to gate at terminal
•Truck electronic card sends its id and a nonce (sequential number) to gate, encrypted with gate public key
•Gate checks its database, opens if ID is valid and nonce is greater than the last nonce sent, unless last nonce sent
and stored in database was largest number possible. In that case, any nonce is accepted
T-> G: {T, N}KG
b. List at least two possible attacks against this protocol that may succeed.
• Truck always sends its id and the largest possible N. If black hat can find KG (it’s a public key and can probably
be gotten from another truck) he can encrypt the truck id T and nonce N with KG.
• Black hat captures all transmissions for a period of time. Assume he can observe T (truck id) and N is in a small
range. He can probably crack KG.
• Black hat steals a transponder from a truck and places it on another vehicle. If there is no visual check, no one
will notice that the truck id T does not match the number painted on the truck.
• Black hat bribes someone to disclose the private gate key.
Live Exam Help
c. List one possible attack against security protocols that this protocol can usually withstand.
Replay attack will usually not work. If black hat can’t find KG, he can try to replay a transmission from truck to
gate. Since he can’t decrypt it, he can’t guess N and thus open the gate. He can collect transmissions over a long
period and hope that a truck’s N hits the maximum and resets to zero. In that case, a replay attack would work.
Live Exam Help

More Related Content

Similar to Database Exam Help

Network Design for a company
Network Design for a companyNetwork Design for a company
Network Design for a companyrosu555
 
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Edureka!
 
Controller area network as the security of the vehicles
Controller area network as the security of the vehiclesController area network as the security of the vehicles
Controller area network as the security of the vehiclesIAEME Publication
 
Emergency Service Provide by Mobile
Emergency Service Provide by MobileEmergency Service Provide by Mobile
Emergency Service Provide by MobileSamiul Hoque
 
E-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemE-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemIRJET Journal
 
Trisul netflow isp_features
Trisul netflow isp_featuresTrisul netflow isp_features
Trisul netflow isp_featurestrisulnsm
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machineijsrd.com
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in JavaTushar B Kute
 
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...InfluxData
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in JavaTushar B Kute
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rulesFreddy Buenaño
 

Similar to Database Exam Help (17)

Network Design for a company
Network Design for a companyNetwork Design for a company
Network Design for a company
 
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
 
Controller area network as the security of the vehicles
Controller area network as the security of the vehiclesController area network as the security of the vehicles
Controller area network as the security of the vehicles
 
Emergency Service Provide by Mobile
Emergency Service Provide by MobileEmergency Service Provide by Mobile
Emergency Service Provide by Mobile
 
Gsm ( Cdma ( Gsm )
Gsm ( Cdma ( Gsm )Gsm ( Cdma ( Gsm )
Gsm ( Cdma ( Gsm )
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
 
E-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management SystemE-License System With RTO Controle Room Management System
E-License System With RTO Controle Room Management System
 
Trisul netflow isp_features
Trisul netflow isp_featuresTrisul netflow isp_features
Trisul netflow isp_features
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 
Bt0076, tcpip
Bt0076, tcpipBt0076, tcpip
Bt0076, tcpip
 
resume
resumeresume
resume
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in Java
 
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
 
Asuntos de escaneado de transporte pesado
Asuntos de escaneado de transporte pesadoAsuntos de escaneado de transporte pesado
Asuntos de escaneado de transporte pesado
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 

More from Live Exam Helper

Statistical Physics Exam Help
Statistical Physics Exam HelpStatistical Physics Exam Help
Statistical Physics Exam HelpLive Exam Helper
 
Microeconomics Exam Questions and Answers
Microeconomics Exam Questions and AnswersMicroeconomics Exam Questions and Answers
Microeconomics Exam Questions and AnswersLive Exam Helper
 
Exam Questions and Solutions of Molecular Biology
Exam Questions and Solutions of Molecular BiologyExam Questions and Solutions of Molecular Biology
Exam Questions and Solutions of Molecular BiologyLive Exam Helper
 
Probabilistic Methods of Signal and System Analysis Solutions
Probabilistic Methods of Signal and System Analysis SolutionsProbabilistic Methods of Signal and System Analysis Solutions
Probabilistic Methods of Signal and System Analysis SolutionsLive Exam Helper
 
Python Exam (Questions with Solutions Done By Live Exam Helper Experts)
Python Exam (Questions with Solutions Done By Live Exam Helper Experts)Python Exam (Questions with Solutions Done By Live Exam Helper Experts)
Python Exam (Questions with Solutions Done By Live Exam Helper Experts)Live Exam Helper
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam HelpLive Exam Helper
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam HelpLive Exam Helper
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam HelpLive Exam Helper
 
Continuum Electromechanics Exam Help
Continuum Electromechanics Exam HelpContinuum Electromechanics Exam Help
Continuum Electromechanics Exam HelpLive Exam Helper
 
Continuum Electromechanics Exam Help
Continuum Electromechanics Exam HelpContinuum Electromechanics Exam Help
Continuum Electromechanics Exam HelpLive Exam Helper
 
Electromechanics Exam Help
Electromechanics Exam HelpElectromechanics Exam Help
Electromechanics Exam HelpLive Exam Helper
 
Materials Science Exam Help
Materials Science Exam HelpMaterials Science Exam Help
Materials Science Exam HelpLive Exam Helper
 
Nuclear Engineering Exam Help
Nuclear Engineering Exam HelpNuclear Engineering Exam Help
Nuclear Engineering Exam HelpLive Exam Helper
 
Engineering Management Exam Help
Engineering Management Exam HelpEngineering Management Exam Help
Engineering Management Exam HelpLive Exam Helper
 

More from Live Exam Helper (20)

Nursing Exam Help
Nursing Exam HelpNursing Exam Help
Nursing Exam Help
 
Statistical Physics Exam Help
Statistical Physics Exam HelpStatistical Physics Exam Help
Statistical Physics Exam Help
 
Take My Nursing Exam
Take My Nursing ExamTake My Nursing Exam
Take My Nursing Exam
 
Pay for economics exam
Pay for economics  examPay for economics  exam
Pay for economics exam
 
Take My Economics Exam
Take My Economics ExamTake My Economics Exam
Take My Economics Exam
 
Best Economics Exam Help
Best Economics Exam HelpBest Economics Exam Help
Best Economics Exam Help
 
Take My Accounting Exam
Take My Accounting ExamTake My Accounting Exam
Take My Accounting Exam
 
Microeconomics Exam Questions and Answers
Microeconomics Exam Questions and AnswersMicroeconomics Exam Questions and Answers
Microeconomics Exam Questions and Answers
 
Exam Questions and Solutions of Molecular Biology
Exam Questions and Solutions of Molecular BiologyExam Questions and Solutions of Molecular Biology
Exam Questions and Solutions of Molecular Biology
 
Probabilistic Methods of Signal and System Analysis Solutions
Probabilistic Methods of Signal and System Analysis SolutionsProbabilistic Methods of Signal and System Analysis Solutions
Probabilistic Methods of Signal and System Analysis Solutions
 
Python Exam (Questions with Solutions Done By Live Exam Helper Experts)
Python Exam (Questions with Solutions Done By Live Exam Helper Experts)Python Exam (Questions with Solutions Done By Live Exam Helper Experts)
Python Exam (Questions with Solutions Done By Live Exam Helper Experts)
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam Help
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam Help
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam Help
 
Continuum Electromechanics Exam Help
Continuum Electromechanics Exam HelpContinuum Electromechanics Exam Help
Continuum Electromechanics Exam Help
 
Continuum Electromechanics Exam Help
Continuum Electromechanics Exam HelpContinuum Electromechanics Exam Help
Continuum Electromechanics Exam Help
 
Electromechanics Exam Help
Electromechanics Exam HelpElectromechanics Exam Help
Electromechanics Exam Help
 
Materials Science Exam Help
Materials Science Exam HelpMaterials Science Exam Help
Materials Science Exam Help
 
Nuclear Engineering Exam Help
Nuclear Engineering Exam HelpNuclear Engineering Exam Help
Nuclear Engineering Exam Help
 
Engineering Management Exam Help
Engineering Management Exam HelpEngineering Management Exam Help
Engineering Management Exam Help
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Database Exam Help

  • 1. Database, Internet, and Systems Integration Technologies For more information, Visit: https://www.liveexamhelper.com/ Contact: +1 678 648 4277 Mail us at: info@liveexamhelper.com Live Exam Help
  • 2. An airline operates a set of flights. A flight has a flight number, an origin airport and a destination airport. All flights operate daily. When a passenger books a ticket, the airline registers their name, and assigns them a specific seat on a flight on a departure date. Assume all simple types are #PCDATA, except airports, which are either “BOS”, “SJU”, “SFO”, “JFK”, “DCA” or “MAD”. 1. Write a DTD file for the airline’s set of flights and passenger info. The first line is provided. You may wish to draw a data model and write the XML file (part 2) first. Solution: <?xml version="1.0" encoding="iso-8859-1"?> (PROVIDED) <!ELEMENT flightlist (flight+)> <!ELEMENT flight (passengers+)> <!ATTLIST flight number #PCDATA origin ("BOS"|"SJU"|"SFO"|"JFK"|"DCA"|"MAD") dest ("BOS"|"SJU"|"SFO"|"JFK"|"DCA"|"MAD")> <!ELEMENT passengers (passenger+)> <!ATTLIST passengers date #PCDATA > <!ELEMENT passenger EMPTY> <!ATTLIST passenger name #PCDATA seat #PCDATA > Live Exam Help
  • 3. 2. Write an XML file that conforms to the DTD that you created in the previous step. Create 2 flights on 2 dates with 2 passengers per flight. Solution: a. XML File <flightlist> <flight number=”1” origin=”BOS” dest=”SJU”> <passengers date=”12-4-2012”> <passenger name=”Laura” seat=”1A”/> <passenger name=”Anna” seat=”1B”/> </passengers> <passengers date=”12-5-2012”> <passenger name=”Tatiana” seat=”1C”/> <passenger name=”Candy” seat=”1D”/> </passengers> </flight> <flight number=”2” origin=”SFO” dest=”JFK”> <passengers date=”12-4-2012”> <passenger name=”Charlie” seat=”1A”/> <passenger name=”Ivan” seat=”1B”/> </passengers> <passengers date=”12-5-2012”> <passenger name=”Dan” seat=”1C”/> <passenger name=”Li” seat=”1D”/> </passengers> </flight> </flightlist> Live Exam Help
  • 4. b. How will the airline alter the tag names when sending XML to a partner airline, if a partner’s XSD or DTD is slightly different for a request or response? XSLT c. Can the XML file be sent as a Web service response to a request? What are the parameters in the request? Yes; flight number& airports can serve as parameters d. Your airline sends just XML documents to each gate at each airport. What XML standard must a manager at an airport use to display the XML that is sent, so he or she can read it formatted well in a browser? XSLT to style the XML and present it in their browser e. Your airline is expanding to several airports in Africa, each served by a VSAT terminal with a bandwidth of 9.6 kbps. You send 500 XML messages per hour to each airport; there are many changes in reservations and connections. The XML messages use the format you defined in part (2a) above, and contain 1200 characters (bytes) on average. This XML message traffic is 90% of the traffic on these VSAT links. Will a VSAT link provide sufficient bandwidth to an airport? If not, suggest changes that would make this workable. 500 messages times 1200 bytes per hour = 600,000 bytes per hour= 4,800,000 bits per hour/ 3600 seconds/hr=~ 1300 bits/second = 1.3 kbps. This is satisfactory. f. Should your African airports validate each XML message against the DTD published on your Web site, by getting the DTD from the Web site for each message received, or is there a simpler procedure that is acceptable? The airport does not need to get the DTD afresh for every message. It can check the main airline site’s DTD once a day to see if there is an update. Live Exam Help
  • 5. g. What technology would you use if you were in the same city as the VSAT carrier and you wanted to do this at lowest cost? The VSAT carrier has access to the open Internet and also subscribes to a carrier’s Metro Ethernet service, which would cost you $3,000 per month to use and provides 1 Gbps. You are two miles from a central office that offers a wide range of data services, and you are served by a CATV company that offers data services at your location. The telco (central office), CATV and open Internet services cost about $300 per month for 1.5 Mbps DSL or cable modem, with a VPN tunnel, over the open Internet In question (g), what security measures would you use? Briefly justify. Carrier Ethernet would provide security without any further action on your part. To use DSL or CATV over the Internet, you must provide security. A VPN tunnel will encrypt your traffic. In all cases, you must secure your Web site and against attacks: use SSL, strong passwords, certificates. i. Does each African airport need a Web server for its end of these transactions? An app server? A database server? Explain why or why not. All applications used by any airport are provided from the airline’s main data center and are accessed via Web browsers. No servers needed at airport. All apps are accessed using just a client (Web browser). j. Does each African airport need a load balancer? A firewall? A router? Explain why or why not. Load balancer: no. Firewall: yes, next to (or integrated with) the router, and on each client, for security, just as you have on your personal laptops. Router: yes, for routing packets from the VSAT service to the computers on the airline’s LAN at the airport. Live Exam Help
  • 6. k. The CATV carrier serving one of the African airports offers you dedicated use of one 6 MHz CATV channel over which you can run Ethernet between the airport terminal and your maintenance facility on the other side of the airport. The signal-to-noise ratio of this channel is 27; the maximum utilization for Ethernet is 50%. What is the bandwidth, in megabits per second (Mbps), of this channel? Would this be sufficient to stream 4 MPEG-2 (6 Mbps) high-quality security video feeds between the terminal and the maintenance facility? 6 MHz * 27/3 * 0.50= 27 Mbps. This is sufficient to handle 4 6 Mbps streams, which are 24 Mbps. Live Exam Help
  • 7. 3. Medical Supply Chain Security a. Outline how an attack can be launched against a user with a laptop at an Internet café who logs into a medical supply chain Web site from an http (not https) home page, even if all subsequent pages are https (SSL) pages. Man in the middle attack. Hacker intercepts username/login from user to Web site, and uses it to log in his/her computer. He/she then relays pages between Web site and user, while possibly getting identity information, transferring funds, etc. b. Suppose the supply chain companies form a consortium to issue password generator cards that create a new 8 digit passcode every 30 seconds (e.g., Secure-ID) to all their employees. The employee must enter this 8 digit code as part of their password. (There is also a fixed password that the employee chooses and enters, as usual.) They leave their home pages as before (http, but with all pages after login as https). Does this combat the attack in part a above? No. Hacker intercepts the username/password as before (including the Secure-ID portion) and attacks as before. c. What new vulnerability, if any, has the consortium introduced in part b above? Supply chain companies must share the Secure-ID server key, since they all must be able to check all Secure-ID card generated passwords. Having to share this secret increases exposure. d. Some of the password generator cards are stolen, or not returned by employees who leave their companies. Is this a security risk? Briefly give your reasons pro or con. If it is a risk, describe at least one attack that can be executed with a stolen password generator card. These are invalid cards and there is little risk in distributing a list of them. Live Exam Help
  • 8. 4. Truck at a Security Gate a. Write the protocol notation for the following security system: (5 points) •Truck pulls up to gate at terminal •Truck electronic card sends its id and a nonce (sequential number) to gate, encrypted with gate public key •Gate checks its database, opens if ID is valid and nonce is greater than the last nonce sent, unless last nonce sent and stored in database was largest number possible. In that case, any nonce is accepted T-> G: {T, N}KG b. List at least two possible attacks against this protocol that may succeed. • Truck always sends its id and the largest possible N. If black hat can find KG (it’s a public key and can probably be gotten from another truck) he can encrypt the truck id T and nonce N with KG. • Black hat captures all transmissions for a period of time. Assume he can observe T (truck id) and N is in a small range. He can probably crack KG. • Black hat steals a transponder from a truck and places it on another vehicle. If there is no visual check, no one will notice that the truck id T does not match the number painted on the truck. • Black hat bribes someone to disclose the private gate key. Live Exam Help
  • 9. c. List one possible attack against security protocols that this protocol can usually withstand. Replay attack will usually not work. If black hat can’t find KG, he can try to replay a transmission from truck to gate. Since he can’t decrypt it, he can’t guess N and thus open the gate. He can collect transmissions over a long period and hope that a truck’s N hits the maximum and resets to zero. In that case, a replay attack would work. Live Exam Help