Question

In: Computer Science

QUESTION 6 A cryptographic technique that allows the creator of a message to prove that they...

QUESTION 6

  1. A cryptographic technique that allows the creator of a message to prove that they created it, helps to provide authentication, uses public key encryption

2 points   

QUESTION 7

  1. Organization that assumes the responsibility for validating identities and certifying public keys

2 points   

QUESTION 8

  1. Attack in which falsified DNS replies are sent. An attacker hears a DNS request and then sends DNS replies with bogus A and sometimes NS resource records that are then cached by the requester.

2 points   

QUESTION 9

  1. Technique used to find computers that are running a vulnerable application and listening for connections on a particular port. Can also be used to determine all of the ports that a computer is listening on.

2 points   

QUESTION 10

  1. In this attack, the attacker will send many TCP SYN packets, but never complete the handshake (by responding to the receiver’s SYN/ACK). This leaves many “half-open” connections on the receiver and can use up all of the receiver’s resources. Legitimate connections will then not be able to be handled.

Solutions

Expert Solution

(6) Answer: Digital Signature

Description:

• A digital signature is basically a mathematical technique that uses public key encryption method to verify authenticity or integrity of digital messages or documents.

• A digital signature is just like handwritten signatures but in secured and digital form. Recipient can strongly believe by a valid digital signature, that message is created by authenticated sender and not modified in transit.

(7) Answer: certification authority (CA)

Description:

• Certification authority (CA) is the trusted entity or authority that validates identity of individuals and certifies public keys.

• Certification authority certifies a digital certificate for authentication of public key by the named subject.

(8) Answer: DNS spoofing or DNS cache poisoning

Description:

• DNS spoofing - Domain Name Server spoofing is also called as DNS cache poisoning attack in which altered or malicious response records are replied by attacker in a response to DNS request.

• This altered or spoofed DNS records are used by attacker to redirect the traffic to a fake website that resembles its intended original website.

(9) Answer: Port Scanning

Description:

• Port scanning is a technique to check all the ports that a computer system may be listening on. This method is sometimes used by security technicians to check any vulnerable computer application on a particular port.

• Port sweeping method is same as port scanning. Port sweeping method scans multiple systems in a same port where as port scanning scans one system on multiple ports.

(10) Answer: SYN flood attack

Description:

• The SYN flood attack is also known as half-open attack which is one of the types of DDoS distributed denial-of-service attack.

• Attacker repeatedly sends TCP SYN packets to the target server to consist all the available ports or server resources and this will make target server unresponsive or unavailable to legitimate traffic.


Related Solutions

Answer in python! 5.16 LAB: Cryptographic Hashing Algorithms Encrypting text allows us to encrypt and decrypt...
Answer in python! 5.16 LAB: Cryptographic Hashing Algorithms Encrypting text allows us to encrypt and decrypt the text using a special key. Another method of encrypting text / passwords is called hashing. Hashing uses special algorithms to 'scramble' text so that it is tougher to hack. The hash function can take numbers, letters, and symbols then uses one of the special algorithms to output scrambled text. The longer the output string, the harder to hack the data. The difference between...
Which of the following allows a sender to verify the source of a message? Select one:...
Which of the following allows a sender to verify the source of a message? Select one: a. Bitlocker b. Nonrepudiation c. Symmetric key d. Recovery key
Size exclusion chromatography (SEC) is a technique that allows for separation of molecules based on their...
Size exclusion chromatography (SEC) is a technique that allows for separation of molecules based on their size. If organic solvents are used to separate polymers, this application is referred to as gel permeation chromatography, and when aqueous solvents are used to separate proteins and soluble macromolecules, this is known as: a.) Titration b.) Paper chromatography c.) P60 chromatography d.) Silica gel column chromatography e.) Gel filtration chromatography
CR is a molecular biology technique that allows us to replicate DNA in an in vitro...
CR is a molecular biology technique that allows us to replicate DNA in an in vitro system without the need for a ‘replisome’. What conditions or elements used in PCR mimic the effects of the following parts in the replisome? Explain your answer in 1 or 2 sentences. a) Helicase (2 marks) b) Primase (2 marks) c) DNA pol III (2 marks)
A typical SMS protocol allows 128 distinct ASCII characters to be used in a message. However,...
A typical SMS protocol allows 128 distinct ASCII characters to be used in a message. However, to save bandwidth, instead of using straight 8-bit ASCII characters to transfer data (one byte per character), SMS uses 7 bits per character and compacts the bits such that it only requires 140 bytes to send a 160 character message, for an approximately 12.5% savings of bandwidth. 12.5% savings in bandwidth is not good enough. They would like a system that can save up...
What would be the encoded version of the message using LZW compression technique xxyz xxy xxyz...
What would be the encoded version of the message using LZW compression technique xxyz xxy xxyz xxyz xxyz
Question 2. CORRELATION Technique a. Describe the purpose of the Correlation technique b. State at least...
Question 2. CORRELATION Technique a. Describe the purpose of the Correlation technique b. State at least two research problems or question that requires the use of the Correlation technique c. Identify, describe and test the assumptions related to the Correlation technique d. State examples of the Correlation technique outcomes e. State examples of the Correlation technique report results
QUESTION 37 Match the appropriate term to the definition or technique. Each technique can be used...
QUESTION 37 Match the appropriate term to the definition or technique. Each technique can be used only once. As such, choice the best definition       -       A.       B.       C.       D.    Hypothesis Test       -       A.       B.       C.       D.    ANOVA       -       A.       B.       C.       D.    Two Way ANOVA      ...
1. Prove ├(∀x)A ∨ (∀x)B → (∀x)(A ∨ B). 2. Use the ∃ elimination technique —and...
1. Prove ├(∀x)A ∨ (∀x)B → (∀x)(A ∨ B). 2. Use the ∃ elimination technique —and ping-pong if/where needed— to show ├(∃x)A → (∃x)(B → A). Appreciate you.
Prove that if (6; a) = (6; b) = 1, then 24 | (a^2 - b^2).
Prove that if (6; a) = (6; b) = 1, then 24 | (a^2 - b^2).
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT