Hello, the answers I have are wrong. CAn you explain me which one is correct and why?
Question 5:
Ans: A person sends the secret key to another person using the
two-key algorithm and then uses this secret key for
communication
Explanation:
Hybrid encryption method is nothing but the combination of
asymmetric and symmetric encryption to benefit more security. In
this encryption Public key encryption is used for symmetric key
encryption. Reciever uses the public key encryption method to
decrypt the symmetric key. Once the symmetric key is decrypted, by
using that symmetric key we can decrypt original message. So that
this encryption method is considered a most secure encryption.
Question 21:
Ans: access control list bases access control
Explanation:
An access control list (ACL) is nothing but a list of access
control entries (ACE). Each entry in an ACL usually identifies a
trustee and their access rights which are allowed, denied, or
audited.
Question 27:
Ans: of variable length, while the input should be constant
Hello, the answers I have are wrong. CAn you explain me which one is correct and...
QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who they say they are, that the data received is the data that the sender meant to send, and that the receiver is who they say they are a. confidentiality b. authentication c. non-repudiation d. integrity 2 points QUESTION 3 Cryptography method that uses a single key for both encryption and decryption a. prime factorization b. asymmetric c. symmetric d. message authentication code 2...
1. Something you know (SYK) Something you have (SYH) Something you are (SYA) Something you do (SYD) are attributes that allow you to do what to a user? ___________ 2. Consider the primitive case of asymmetric encryption; no digital signature and no digital envelope. A person sends a message to a recipient using asymmetric encryption. What is the total number of keys used to send and receive the single message? _________________ 3. If the sender of a message encrypts the...
You are managing a large scale construction project with hundreds of subprojects, some which have to be completed before others can begin whereas some subprojects can be carried out simultaneously. The project and its subprojects, and the presence of dependencies between subprojects (which subprojects have to be done before which), can be modeled as a connected unweighted directed graph with nodes representing subprojects and directed edges representing dependencies. 42. Which of the following algorithms will allow you to determine if...
Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA { private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) { Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...
The red arrows indicate that the answers were wrong. Can you show me how to do the work to find the correct answers? Please be detailed. all of the answers shown are correct. the reason im posting this question is because i want someone to show me how to get the answers. specifically the red areas. i need help figuring out the red areas even though the numbers are correct i want to see how you solve this question. nothing...
How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...