Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question #1: PERFORM ALL TASK Task 4. A file has a mode of rw-r-r--. If Bob is the file's owner, what can he do with

image text in transcribed

Question \#1: PERFORM ALL TASK Task 4. A file has a mode of rw-r-r--. If Bob is the file's owner, what can he do with it? Task 1. Six friends want to exchange messages with each other using symmetric encryption He can open the file and view its contents, but he can't save any changes. (DES). How many keys are required in total, to enable the six friends to have a secure He can open the file, make changes, and save the file. communication? He can open the file but cannot make changes. 5 He can run the file if it's an executable. 10 Task 5. Alice (IP address X) wants to access the internal server (IP address W) of a 15 company. Therefore, she needs to establish a VPN connection using her VPN client (IP address R). The VPN client sends the packet to the VPN server (IP address Y), which 20 forwards the packet to the internal server. Which information is sent encrypted from the VPN Task 2. When using the RSA algorithm, the sender is encrypting the message with the: client to the VPN server? public key of the receiver VPN client IP address R and internal server IP address W private key of the receiver Alice IP address X and internal server IP address W public key of the sender VPN client IP address R and VPN server IP address Y private key of the sender Alice IP address X and VPN server IP address Y Task 3. When using the CBC encryption mode, which statement is true? Task 9. The client acts on behalf of the server. In which port forwarding technique is this Previous block input is the input of the next block behaviour applied? Previous block output is the input of the next block Remote Forwarding Previous block output is the output of the next block Local Forwarding Previous block input is the output of the next block Stable Forwarding None of the mentioned Task 6. Which statement is true about IP spoofing? Task 10. Which statement is true for a dynamic packet filter? The ARP cache entries will be falsified by wrong mapping of IP and MAC addresses Filtering also depends on previous packets IP packets are sent with fake destination addresses to other nodes Filtering only depends on currently viewed packet ICMP messages are redirected to wrong nodes None of them IP packets are sent with fake source addresses to other nodes The ARP cache entries will be falsified by wrong mapping of IP and DNS records Task 11. Jargon codes are part of Semagrams

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Professional SQL Server 2012 Internals And Troubleshooting

Authors: Christian Bolton, Justin Langford

1st Edition

1118177657, 9781118177655

More Books

Students also viewed these Databases questions

Question

How do we organise for international logistics?

Answered: 1 week ago