Шукаєте відповіді та рішення тестів для 25-26 IY2760/DC3760: Introduction to Information Security? Перегляньте нашу велику колекцію перевірених відповідей для 25-26 IY2760/DC3760: Introduction to Information Security в moodle.royalholloway.ac.uk.
Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!
Choose what type of access control policy this should come under:
Alice creates non-classified documents and wants to be able to decide who has access to them.
Alice sends an email to Bob. Suppose an attacker alters the message undetected. What security property has been compromised?
(There may be more than one correct answer. You only need to pick one.)
Pick all the attack(s) that can be detected using a message authentication code. Marks may be deducted for wrong choices.
Pick all the true statements on risk analysis.
Suppose we want to keep the data on our system confidential. What might be the most effective security controls? (Pick two answers.)
How does the station-to-station (STS) protocol defend against the intruder-in-the-middle attack in the Diffie-Hellman protocol?
Suppose Alice and Bob performs the Diffie-Hellman key exchange, using the public parameters with prime and primitive element .
Alice chooses her secret and Bob chooses his secret .
What does Alice send to Bob and why? (You may assume all the arithmetic is correct.)
In this key establishment protocol,
The protocol runs as follows:
Which message, if any, provides confirmation to that the key is possessed by ? Pick only one answer.
Suppose Alice has an RSA signature scheme with hash function , with the following values:
and
Suppose Alice has signing key .
Suppose Alice wants to send Bob a message which has hash value . She sends and her RSA signature to Bob.
What does Bob do to decide whether to accept this as a valid signature?
Suppose Alice has an RSA signature scheme, with the following values:
and
Suppose Alice has signing key .
Pick all the values that must be kept private and known only to Alice. (Marks may be deducted for incorrect choices.)