Question: Answer all short answer problems (each question carriss 5 roints) B. UTM D. stateful inspection firewall 1. Explain CIA (Confidentiality, Integrity. Availability) triad in brief

 Answer all short answer problems (each question carriss 5 roints) B.

Answer all short answer problems (each question carriss 5 roints) B. UTM D. stateful inspection firewall 1. Explain CIA (Confidentiality, Integrity. Availability) triad in brief 2. List three approaches to message authentication, describe them briefly 3. Explain the natureof the inference threat to an RDBMS What malware? s the difference between a backdoor, a bot, a keylogger, spyware, and a rootki? Can they all be present in the same 5. What is the primary defense against many DoS attacks, and where is it implemented Solve all problems (each question carries 5 pointsE 1). A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V- and C- a). What is the total password population? b). What is the probability of an adversary guessing a password correctly? 2). Assume that passwords are limited to the use of the 95 printable ASClIl characters and that all passwords are 10 second. characters in length. Assume a password cracker with an encryption rate of 6.4 million encryptions per How long will it take to test exhaustively all possible passwords on a UNIX system? 3). Consider an SOL statement: SELECT id, forename, surname FROM authors WHERE forename john AND surname= smith, a. What is this statement intended to do? b. Assume that the forename and surname fields are being gathered from user- supplied input, and suppose the user responds with: Forename: jo'hn Surname: smith What will be the effect? c. What will be the effect? Now suppose the user responds with: Forename: jo'; drop table authors- Surname: smith

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!