Ask Computer Network & Security Expert

1. a) If a message reads "We begin bombing in five minutes.", what would this look like in a Caesar cipher with k=12?

b) What happens to spaces and punctuation in a Caesar cipher?

c) Who got in trouble for using that phrase, and when?

2. With public key encryption, there are two ways you could send a message from Harvey to Eunice:

A. Harvey would apply his private key to the message, and Eunice would decrypt it using Harvey's public key

B. Harvey would apply Eunice's public key to the message, and Eunice would decrypt it using her private key.

How do these methods (A versus B) differ in terms of the authentication and confidentiality provided? Be sure to answer both aspects for both methods.

3. Why does it matter if a server has unused ports left open? What kind of attacks could take advantage of this?

4. a) If I maintain an offsite backup of my system so I can restore it after a virus wipes it out, is this part of a prevention, detection, or mitigation strategy? Explain your answer.

b) Provide examples of the other two strategies for that threat.

5. What algorithms did we discuss for:

a) symmetric encryption?

b) public key encryption?

6. SHAVS is a validation test suite for SHA (NIST, 2004). What three kinds of tests does it execute? How long is the longest test string used?

7. a) How does a message digest differ from a digital signature?

b) Would it be practical to use both on the same message? Explain your answers.

8. In what way are MD5 and SHA different from DES and RSA?

9. What kind of attack does the use of a nonce prevent?

10. What kind of key authority is used to prevent the man-in-the-middle attack when using public key encryption?

11. How does the output of MD5 differ from that of SHA-1?

12. Snort can do both signature-based and anomaly-based intrusion detection, but it can also do a third kind of detection. Name and describe it.

13. AES and RSA can both have 128-bit keys. Which is stronger, and why?

14. How does 802.11n differ from 802.11g?

15. If 802.11a uses 11 channels, what is the span of frequencies for each channel?

16. Describe in your own words the difference between DIFS and SIFS.

17. Find two specific retail devices that use the Zigbee protocol. Describe them and cite their sources.

18. If you want your home network to be more secure, would you use agent advertisement or agent solicitation? Explain your answer.

19. The new "4K SUHD" TVs can scan 3840 x 2160 pixels at up to 240 Hz. Assuming 32 bits of data per pixel, what data rate is needed to support them without compression?

20. Describe the differences between symmetric and public key encryption. Address how to provide authentication, confidentiality, and verify message integrity using them.

21. What type of attack makes public key encryption less secure than symmetric?

22. How is an access control list used by a firewall?

23. What does a MIB store and where does it get it from?

24. What environmental conditions might you monitor for a physically remote network location (e.g. your system is in a building in the woods), and what potential problem would you look for with respect to each condition? Identify at least three conditions.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91696544
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As