Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Question #1: PERFORM ALL TASK Task 4. A file has a mode of rw-r-r--. If Bob is the file's owner, what can he do with
Question \#1: PERFORM ALL TASK Task 4. A file has a mode of rw-r-r--. If Bob is the file's owner, what can he do with it? Task 1. Six friends want to exchange messages with each other using symmetric encryption He can open the file and view its contents, but he can't save any changes. (DES). How many keys are required in total, to enable the six friends to have a secure He can open the file, make changes, and save the file. communication? He can open the file but cannot make changes. 5 He can run the file if it's an executable. 10 Task 5. Alice (IP address X) wants to access the internal server (IP address W) of a 15 company. Therefore, she needs to establish a VPN connection using her VPN client (IP address R). The VPN client sends the packet to the VPN server (IP address Y), which 20 forwards the packet to the internal server. Which information is sent encrypted from the VPN Task 2. When using the RSA algorithm, the sender is encrypting the message with the: client to the VPN server? public key of the receiver VPN client IP address R and internal server IP address W private key of the receiver Alice IP address X and internal server IP address W public key of the sender VPN client IP address R and VPN server IP address Y private key of the sender Alice IP address X and VPN server IP address Y Task 3. When using the CBC encryption mode, which statement is true? Task 9. The client acts on behalf of the server. In which port forwarding technique is this Previous block input is the input of the next block behaviour applied? Previous block output is the input of the next block Remote Forwarding Previous block output is the output of the next block Local Forwarding Previous block input is the output of the next block Stable Forwarding None of the mentioned Task 6. Which statement is true about IP spoofing? Task 10. Which statement is true for a dynamic packet filter? The ARP cache entries will be falsified by wrong mapping of IP and MAC addresses Filtering also depends on previous packets IP packets are sent with fake destination addresses to other nodes Filtering only depends on currently viewed packet ICMP messages are redirected to wrong nodes None of them IP packets are sent with fake source addresses to other nodes The ARP cache entries will be falsified by wrong mapping of IP and DNS records Task 11. Jargon codes are part of Semagrams
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started