Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

Stateful

The process of verifying and identity claimed by or for a system entity. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | An attacker alters his identity so that someone thinks he is someone else | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | According to DAD triad, ___________ attempts to defeat availability. | The quality or state of having ownership or control of some object or item. | Personal Firewall |


Читайте также:
  1. A stateful firewall maintains a ______________, which is a list of active connections.

176. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability.

Security service

Security mechanism

Security threat

All of the statements

Security attack

178. Using the RSA algorithm find d where p = 17, q = 31, e = 7 and M = 2.

179. Encrypt the message CVKKT W'YVT using the Caesar Cipher with the key 73

180. What would firewall need to protect?

Specific services

Specific machines or networks????

Users

Information - private or public

All of the statements

181. Which of the following statement is NOT TRUE?

Asymmetric cryptography is also known as public key cryptography

The public key and private key are mathematically related

Asymmetric cryptography is a form of cryptography in which a user has a pair of cryptographic keys

The public key is kept secret while the private key may be widely distributed

The private key cannot be practically derived from the public key

182. Perform decryption using the Playfair Cipher where the message is "FCHLNSGD" and the key is "FINAL EXAM".

183. _____________ - normally running on a dedicated network device or computer positioned on the boundary of two or more networks.

Software Firewall


Дата добавления: 2015-08-18; просмотров: 58 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
I and II only| Question 1

mybiblioteka.su - 2015-2024 год. (0.006 сек.)