Information Managment Systems
Part 1, cipher rounds (3 at 3 points each), part 2, multiple choice, 1 point each.
Suppose we have the plaintext byte: lower case s = 01110011 in ascii binary:
L1 L2 L3 L4 R1 R2 R3 R4
PlainText 0 1 1 1 0 0 1 1
1. Show the next full substitution and transposition round using the information above if the next subkey is 1110:
L1 L2 L3 L4 R1 R2 R3 R4
PlainText 0 1 1 1 0 0 1 1
Subkey
Apply Round Function to Rbits
Round Function Result
XOR with Lbits
Swap halves
2. Starting from the last round, do the next full substitution and transposition round if the next subkey is 0001:
L1 L2 L3 L4 R1 R2 R3 R4
PlainText
Subkey
Apply Round Function to Rbits
Round Function Result
XOR with Lbits
Swap halves
3. Now, ignoring the previous round, say we are on the 11th round and we have the following plaintext byte in binary:
L1 L2 L3 L4 R1 R2 R3 R4
PlainText 0 1 0 1 0 1 1 1
And if you have the following subkey 1010, complete the round:
L1 L2 L3 L4 R1 R2 R3 R4
PlainText
Subkey
Apply Round Function to Rbits
Round Function Result
XOR with Lbits
Swap halves
4. In Windows, what subsystem is responsible for brokering access to objects:
___ Object Manager (OM) ___ Security Accounts Manager (SAM)
___ Active Directory (AD) ___ Mandatory Access Control Manager (MACM)
5. X.509 certificates are based on the standard issued by:
___ The United States Government ___ International Standards Organization
___ Microsoft ___ International Telecommunications Union
6. A “good” security policy should cover all of the following EXCEPT:
___ Correcting Physical Damage ___ Recovering from Human Errors
___ Disaster Recovery ___ How to Retaliate
7. At what layer begins end-to-end security?
___ Session ___ Network
___ Transport ___ Application
8. ______________________ are implemented by the network resource manager making a decision about allowing or denying a request to access an object by a user and the security level of the object. In this approach, users are given a security clearance and data are classified with the classification stored in the security labels of the resource.
___ A discretionary access control (DAC) ___ Permitted access control (PAL)
___ Mandatory access control (MAC) ___ Configured access level (CAL)
9. A pessimistic security stance:
___ Only permits those actions specifically allowed ___ Is the same thing as a blacklist
___ Permits actions unless they are explicitly denied ___ Is usually the default setting in router firewalls
ORDER THIS ESSAY HERE NOW AND GET A DISCOUNT !!!
You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.
Latest completed orders:
# | topic title | discipline | academic level | pages | delivered |
---|---|---|---|---|---|
6
|
Writer's choice
|
Business
|
University
|
2
|
1 hour 32 min
|
7
|
Wise Approach to
|
Philosophy
|
College
|
2
|
2 hours 19 min
|
8
|
1980's and 1990
|
History
|
College
|
3
|
2 hours 20 min
|
9
|
pick the best topic
|
Finance
|
School
|
2
|
2 hours 27 min
|
10
|
finance for leisure
|
Finance
|
University
|
12
|
2 hours 36 min
|