Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
a briefly explain the following security goals provided by cryptography confidentiality authentication integrity and non-repudiationb state
a using fermats theorem find 3201 mod 11b explain how the diffie-hellman key agreement protocol works and what its purpose and main properties
ai bob has public rsa key n 77 e 7show that bobs private key is d 43ii alice wants to send the message m 13 to bob she encrypts the message
a i if m pmiddotqmiddotr where p q and r are prime numbers what is phimii therefore determine phi440b describe the following terms as used in
use the chinese remainder theorem to evaluate x from the following simultaneous congruencesx equiv 1 mod 2 x equiv 2 mod 3 x equiv 3 mod 5calculate
a using the extended euclidean algorithm find the multiplicative inverse of 504 mod 67b decrypt the following ciphertext which has been encrypted
a consider the subsequent authentication optionsa using passwordb using pin and fingerprintwhich option a or b provides stronger security and whyb
a which pki public key infrastructure model is typically favored by business organizationb give one possible use of the extensions field of an
a explain the two possible configuration for 3desb what is the main disadvantage of 3desc why are most modern symmetric algorithm block ciphersd
problema distinguish between passive and active attacksb give two reasons why it is important to organise security awareness programs for usersc
problema give two reasons for companies to implement security measuresb what is the regulatory expectation regardingi healthcare information ii
a describe rsa encryptionb for an rsa encryption the values of the primes are p29 q31 select e11 evaluate the public and private keysc how can rsa be
a describe des encryption with a block diagram and brief stepsb how does triple des improve security what is the effective key length of triple des
a what is a pseudorandom generator give an example describing how it worksb explain the key components of a wireless network and their purposec
a show four network security attacks how do they compromise securityb in what ways do the following devices or services contribute to securityi
the following dna sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor tf the nucleotide
intercultural sensitivity recognising differences you represent a mauritian computer company which is negotiating to buy hardware from a manufacturer
questiona draw a typical hybrid star-ring topology paying attention to how the clients and switching hubs are connectedb state 3 main differences
questiona from the capture below give the datagram source ip address upper layer protocol total length in decimal and header checksum in hexadecimal
problema consider a 1000 mbps ethernet with a single store-n-forward switch mid-way in the path between two nodes a and b assume that there are no
questiona give two reasons why the building-block approach is favoured to the traditional network design approachb with reference to network
a explain the contents of the cost assessmentb various documents are needed for configuration management state three of them and describe their
a define the term enterprise networkb briefly discuss the similarity and differences between a switch and a routerc a company xyz has been renting
problema as a forensic investigator you are needed to trace the source of an email it is suspected that the email header has been forged show how