+1(316)4441378

+44-141-628-6690

Information Managment Systems

 

Part 1, cipher rounds (3 at 3 points each), part 2, multiple choice, 1 point each.
Suppose we have the plaintext byte: lower case s = 01110011 in ascii binary:
L1 L2 L3 L4 R1 R2 R3 R4
PlainText 0 1 1 1 0 0 1 1

1. Show the next full substitution and transposition round using the information above if the next subkey is 1110:
L1 L2 L3 L4 R1 R2 R3 R4
PlainText 0 1 1 1 0 0 1 1
Subkey
Apply Round Function to Rbits
Round Function Result
XOR with Lbits
Swap halves

2. Starting from the last round, do the next full substitution and transposition round if the next subkey is 0001:
L1 L2 L3 L4 R1 R2 R3 R4
PlainText
Subkey
Apply Round Function to Rbits
Round Function Result
XOR with Lbits
Swap halves

3. Now, ignoring the previous round, say we are on the 11th round and we have the following plaintext byte in binary:
L1 L2 L3 L4 R1 R2 R3 R4
PlainText 0 1 0 1 0 1 1 1

And if you have the following subkey 1010, complete the round:

L1 L2 L3 L4 R1 R2 R3 R4
PlainText
Subkey
Apply Round Function to Rbits
Round Function Result
XOR with Lbits
Swap halves

4. In Windows, what subsystem is responsible for brokering access to objects:
___ Object Manager (OM) ___ Security Accounts Manager (SAM)
___ Active Directory (AD) ___ Mandatory Access Control Manager (MACM)

5. X.509 certificates are based on the standard issued by:
___ The United States Government ___ International Standards Organization
___ Microsoft ___ International Telecommunications Union

6. A “good” security policy should cover all of the following EXCEPT:
___ Correcting Physical Damage ___ Recovering from Human Errors
___ Disaster Recovery ___ How to Retaliate

7. At what layer begins end-to-end security?
___ Session ___ Network
___ Transport ___ Application

8. ______________________ are implemented by the network resource manager making a decision about allowing or denying a request to access an object by a user and the security level of the object. In this approach, users are given a security clearance and data are classified with the classification stored in the security labels of the resource.
___ A discretionary access control (DAC) ___ Permitted access control (PAL)
___ Mandatory access control (MAC) ___ Configured access level (CAL)

9. A pessimistic security stance:
___ Only permits those actions specifically allowed ___ Is the same thing as a blacklist
___ Permits actions unless they are explicitly denied ___ Is usually the default setting in router firewalls

 
ORDER THIS ESSAY HERE NOW AND GET A DISCOUNT !!!

 

You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.

 

Latest completed orders:

# topic title discipline academic level pages delivered
6
Writer's choice
Business
University
2
1 hour 32 min
7
Wise Approach to
Philosophy
College
2
2 hours 19 min
8
1980's and 1990
History
College
3
2 hours 20 min
9
pick the best topic
Finance
School
2
2 hours 27 min
10
finance for leisure
Finance
University
12
2 hours 36 min
[order_calculator]