Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

I and II only

Match each term according to their meanings in Public-Key Cryptosystem | The process of verifying and identity claimed by or for a system entity. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | An attacker alters his identity so that someone thinks he is someone else | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | According to DAD triad, ___________ attempts to defeat availability. | The quality or state of having ownership or control of some object or item. |


I only

I and III only

172. Which of these is possibly the best password that user can choose?

Nursultan1612

$tana8567

k@zaKha

aLm4tyc?TY

14G:c*%3wM*-l6g_Bnp?d86

173. Decipher the message GBHJNTAK using the Hill Cipher with the inverse key

174. Which of the following are weaknesses of Stateful Packet Inspection Firewall?(Choose 2 answers)

Stateful packet inspection compares the packets against the rules or filters and then checks the dynamic state table to verify that the packets are part of a valid, established connection.

By having the ability to "remember" the status of a connection, this method of packet screening is better equipped to guard against attacks than standard packet filtering.

Like packet filtering, stateful packet inspection does not break the client/server model and therefore allows a direct connection to be made between the two endpoints

The packets are compared to pre-configured rules or filters and allow or deny decisions are made based on the results of the comparison.

Rules and filters in this packet screening method can become complex, hard to manage, prone to error and difficult to test.

175. _______________ firewall keeps track of the state of network connections (such as TCP streams) traveling across it.

Stateless

Software

Personal

Network


Дата добавления: 2015-08-18; просмотров: 77 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
Personal Firewall| Stateful

mybiblioteka.su - 2015-2024 год. (0.007 сек.)