Page 1 of 1

Q2: Determine the True or False statement in the follows: (3 Points) • In secure system, the password file is encrypted

Posted: Tue May 24, 2022 8:42 am
by answerhappygod
Q2 Determine The True Or False Statement In The Follows 3 Points In Secure System The Password File Is Encrypted 1
Q2 Determine The True Or False Statement In The Follows 3 Points In Secure System The Password File Is Encrypted 1 (603.41 KiB) Viewed 15 times
Q2: Determine the True or False statement in the follows: (3 Points) • In secure system, the password file is encrypted with strong key. • Based on individual inference and knowing metadata, it is possible by unauthorized people to access the protected data. • Based on biometric authentication, it is not possible to accept the wrong person on behalf of eligible subject. Q3: Select all invalid RSA private key number in the following: (4 Points) . 331, 38293> . <251, 9062341> <152, 148069> <579, 164783> . None of the above bytes. Find the length of input message. Q4: Based on MD5 hash algorithm if we used 23 blocks and the padding size is 9 (4 Points)

Q5: Based on RSA algorithm, if Ali's public key is <53, 13019> and Bader's private key is <53, 16560>. Now if Ali wants to sign the message that equal 331. Find the following: (5 Points) . The signature value and procedure: • The verification value and procedure: Q6: Based on FTK and MFT file we have found (4 Points) 00 00 00 00 00 00 05 00-10 00 00 00 18 00 00 00 CO AD 17 21 C4 AS EC 11-AS 51 00 50 56 00 00 08 20 00 00 00 48 00 00 00-01 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00-23 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00-00 40 02 00 00 00 00 00 SE 3F 02 00 00 00 00 00-5E 3F 02 00 00 00 00 00 21 24 ED 05 00 00 00 00-00 00 00 00 58 00 00 00 00 OF 18 00 00 00 04 00-1A 00 00 00 38 00 00 00 SA 00 EF 00 E 00 45 00-2E 00 49 00 64 00 45 00 E 00 74 00 49 00 66 00-69 00 65 00 72 00 00 00 5B 5A 7 E 65 54 72 61-E 73 66 65 72 5D OD OA SA EF E 45 49 4 3D 33-0D 0A 00 00 00 00 00 00 TF FF FF FF 82 79 47 11-00 00 00 00 00 00 12 00 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 Find the file size in bytes.

Q7: Based Biba security policy model and Ring property, if Ali can read objects from High, Medium, and low levels, in addition can write only to Medium and Low levels only. Find Ali's security level. (3 Points) Q8: Based on Kerberos protocol, if whatever underlined is correct, correct any mistake(s) if any in the following second line of protocol (3 Points) A-S: (TA.L.KBS. B. (TA, L, KBS, A) KAB) KAB