[SOLVED] information technology

I’m studying and need help with a Computer Science question to help me learn.

Struggling to find relevant content or pressed for time? – Don’t worry, we have a team of professionals to help you on
[SOLVED] information technology
Get a 15% Discount on this Paper
Order Now

General questions

  • Which of the following are not directly addressed when implementing network security? (Choose two.)

    A) Personal safety
    B) Physical plant security
    C) Evolving business requirements
    D) Protection of data
    E) Freedom of information initiatives

  • Select from the following the best definition of security risk analysis:
  • Which of the following is considered the first line of defense against human behavior?

    A) Policies
    B) Cryptography
    C) Physical security
    D) Business continuity planning

  • Which of the following is considered a flaw, loophole, oversight, or error that makes the organization susceptible to attack or damage?

    A) Risk
    B) Vulnerability
    C) Exposure
    D) Threat

  • The two methods of encrypting data are
    A) Substitution and transposition
    B) Block and stream
    C) Symmetric and asymmetric
    D) DES and AES
  • The only cipher system said to be unbreakable by brute force is
    A) AES
    B) DES
    C) One-time pad
    D) Triple DES
  • When a user needs to provide message integrity, what options may be the best?
    A) Send a digital signature of the message to the recipient
    B) Encrypt the message with a symmetric algorithm and send it
    C) Create a checksum, append it to the message, encrypt the message, then send it to the recipient
    D) Encrypt the message with a private key so the recipient can decrypt with the corresponding public key
  • Consider the following protocol that involves both RSA public-key operations and DES. Suppose that A has an RSA private key prv(A) and an RSA public key pub(A). Suppose that B has an RSA private key prv(B) and an RSA public key pub(B). Assume both A and B knows each other’s public key. A wants to send B some message M. A selects random DES key K and send B the following two messages:
  • Suppose a user is authenticated based on an ID and password that are supplied by the transmitter in plaintext. Does it make any difference if the password and ID are encrypted?
  • You have an issue in your company with users claiming they did not receive e-mail messages, while other users claim they were sent. What PKI component will help you to prove the dates and times of messages sent on the network?

    A) Non-Repudiation
    B) Encryption
    C) Encapsulation
    D) Integrity
    E) Confidentiality

  • A certificate authority provides what benefits to a user?
    A) Protection of public keys of all users
    B) History of symmetric keys
    C) Proof of nonrepudiation of origin
    D) Validation that a public key is associated with a particular user
  • All of the following are types of cyber attack, except:

    A) A nuclear explosion that knocks out all electronic devices.
    B) Spam.
    C) Malicious software designed to interrupt services.
    D) A flood of computers hacked to disrupt other computers.

  • If you notice that the number of existing half-open sessions is beginning to rise, what could this indicate? (Select all that apply)

    A) Answers
    B) Man in the Middle attack
    C) Serial Scan
    D) IP Spoofing
    E) Port Scan
    F) DoS attack

  • DoS attacks exist for which part of the OSI protocol stack?

    A) Application and Presentation
    B) Session and Transport
    C) Network and Data Link
    D) All of the above

  • Consider using DHCP. What are the major security concerns? Indicate the two best answers from the following list.

    A) Anyone hooking up to the network can automatically receive a network address.
    B) Clients might be redirected to an incorrect DNS address.
    C) The network is vulnerable to man-in-the-middle attacks.
    D) There are no security concerns with using DHCP.

  • Risk analysis looks at the probability that a vulnerability exists in your system.
  • Risk analysis looks at the probability that your security measures won’t stop a hacker breaking in to your system.
  • Risk analysis determines what resources you need to protect and quantifies the costs of not protecting them.
  • Risk analysis looks at the probability that a hacker may break in to your system.
  • Risk analysis looks at the consequences of being connected to the Internet.

Cryptography Fundamentals. Public-Key Cryptography and Message Authentication

Key Distribution and User Authentication

— Epub(B)( K, Sigprv(A)(K))
— EK(M)

“E” means encryption and “Sig” means digital signature. Which of the following statement(s) is true? (Choose two.)
(A) Only B can decipher the contents of the message M.
(B) B is certain that the message M is from A.
(C) B can prove to a third party that the message M arrived from A.(D) B cannot decipher the contents of the message M.
(E) B is not certain that the message M is from A.

  • If the system authenticates users based on IDs and passwords that are transmitted in plaintext, the system is very insecure.
  • If the password and ID are encrypted, the system is definitely more secure than in the plaintext case.
  • The intruder can still record the encrypted ID and the corresponding encrypted password. By replaying these, the intruder can gain access to the system.
  • None of the above is correct.

Network Vulnerabilities, Attacks and Countermeasures

Please put your answers in the following table.

Multiple Choice Questions

Answer

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

Part 2: Short Answers. Please answer briefly and completely.

  1. Consider the following hashing algorithm. A binary block of length M is divided into subblocks of length 128 bits, and the last block is padded with zeros to a length of 128. The hash consists of the XOR of the resulting 128-bit vectors. Is this algorithm appropriate for encryption? Explain. (16 points)

  1. Can two network interfaces have the same IP address? Why or why not? (12 points)

  • Alan and Bill agree (through a public exchange) on using the Diffie-Hellman algorithm to create a common secret key.They also agree on two public numbers: q (large prime number), a (generator mod q):q = 13, a = 3

Alan generates a random RA =11.

Bill generates a random RB =13.

  • What is the SA Alan sends to Bill ?(i.e.SA =?(3 points)
  • What is the SBBill sends to Alan? (i.e.SB =?(3 points)
  • Show how Alan can calculate to obtain a common secret key.What is the common secret key? (3 points)
  • Show how Bill can calculate to obtain a common secret key. What is the common secret key? (3 points)

Note you need to show the calculation procedures step by step in (a)-(d).

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyCoursebay
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
English 101
I'm glad i came to you guys
Customer 452519, May 11th, 2021
Nursing
Always on time and a life saver for sure!!!!!!!!!!!!
Customer 452453, October 22nd, 2021
Nursing
This is great! Thank you
Customer 452679, December 16th, 2021
Nurse
Great work! Thank you for the quality you put in each assignment.
Customer 452707, February 4th, 2022
Nursing
Always perfect! Thank you!!!
Customer 452453, April 15th, 2021
Other
AWESOME
Customer 452813, June 20th, 2022
Other
Thanks for the help, appreciate it
Customer 452821, August 27th, 2022
Business and administrative studies
GREAT
Customer 452813, June 20th, 2022
Other
NICE
Customer 452813, June 25th, 2022
Other
Great Work!
Customer 452587, March 10th, 2022
Social Work and Human Services
Thank you
Customer 452559, July 2nd, 2021
Education
Thank you so much for your help so I do not go insane from trying to do this. I have 2 more courses to do. Probably will be using you again.
Customer 452675, November 28th, 2021
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Order your essay today and save 15% with the discount code DC15

NEW

Thank you for choosing MyCoursebay. Your presence is a motivation to us. All papers are written from scratch. Plagiarism is not tolerated. Order now for a 15% discount

Order Now