Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

I have answered the questions; however, I am uncertain if I am on the right track. Can you please let me know with some explanation if your answers are different?

1. Which best describes how malicious code can get on your computer?

a. Email attachments

b. Downloaded software from non-authoritative sources and websites

c. Sharing diskettes from computers without up to date antivirus software

d. All of the above

e. A and C only

My guess is "all of the above".

2. A way of verifying a message's integrity after transport across a network is through the use of:

a. A Message Authentication Code

b. Steganography

c. An encryption key

d. A cipher

My Guess is an encryption key as this appears to be the safest way to transmit a message.

3. Which of the following best describes examples of mobile code?

a. Java, Javascript, and ActiveX

b. HTML, the language of web pages

c. Postscript, the language of some LaserJet printers

d. All of the above

e. None of the above

My guess is (A) as HTML is for web pages and (C) I have no idea what it is used for.

4. Which statement best describes the advantages of public key encryption?

a. Keys are exchanged publicly without an eavesdropper being able to decrypt messages

b. Knowledge of one's public key does not yield knowledge of their private key

c. Encryption performance is faster than secret-key encryption

d. A and B only

e. None of the above

My guess is (A) is this correct..for some reason it doesn't look right.

5. Which statement best captures the advantage of secret key encryption?

a. It allows for faster encryption speeds than public key encryption

b. It only requires one key to be distributed for encryption and decryption

c. The keys are stronger than public keys and are more difficult to break

d. All of the above

e. A and B only.

My guess is (a).

6. Which of the following best describes what is removed from a hard drive when a file is deleted from the hard drive?

a. The MBR record, the FAT record, and the Directory Table entry.

b. The FAT record, the Directory Table entry, and the data clusters that the file occupied.

c. The FAT record and the Directory Table entry.

d. The FAT record, the Directory Table Entry, and the Partition Table.

My guess is (b).

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91618288
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Advanced wireless networks assignment -wlan design project

Advanced Wireless Networks Assignment - WLAN Design Project - Description: You need to form a group of at most four students, and select one of the case studies provided in Assessment module on VU Collaborate. In this pr ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

A develop a caesar cipher-type encryption algorithm with a

a. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the amount of the key value. V ...

Assessment - network analysis using wiresharkpurpose of the

Assessment - Network Analysis using Wireshark Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the comple ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

If a firms total cost function is given byt c

If a firm's total cost function is given byT C= 115,000Q-500Q2+Q3, what range of output does the firm have economies of scale?

A wall street journal article noted that a study by us

A Wall Street Journal article noted that a study by U.S. Congressional Budget Office "estimated raising the minimum wage to $10.10 per hour reduced U.S employment by 500,000 but lift 900,000 Americans out of poverty". Wh ...

In a short paragraph explain the transmission of data for a

In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one packet. Assum ...

1srin response to nmap -n -sn localhost what kind of

1. SR In response to "nmap -n -sn localhost": What kind of information did the nmap scan results show you, specifically? 2. FIB What does the "-sn" option do in nmap? ping scan -disable port scan 3. SR How does the "-sn" ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As