Question: The subject is security Q1: Determine the True or False in the following: (6 Points) Shin 1. It is possible that the number of character
Q1: Determine the True or False in the following: (6 Points) Shin 1. It is possible that the number of character in cipher text to be more than plain text. 2. Based on MDS hash function algorithm, if the input is 2GB then the output 3. Based on Biba ring policy, Ali with high level permission can read from 4. In biometric authentication system, the time required for identification is 5. In Bell-LaPadula (BLP) security model, the clearance is provided for each 6. Based on Bell-Lapadula (BLP) security model, and by using strong is 512 bits. medium level. more than verification. object and label for each subject. property, the subject with confidential level can modify an ob ect at secret level. Q2: In the case that the hash value of password is stored in the database. How can the system authenticate the user, when the user wants to access to the system? Write all steps 520 2 Points) 1. The system asks the user to provide user name and password. 2. 3. 4. 5
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
