Midterm - 2 Questions (1)

.docx

School

San Jose State University *

*We aren’t endorsed by this school

Course

22

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

10

Uploaded by SuperHumanSnailPerson797

Report
Q1. In a Linux system, the file that stored users’ hashed password is named ________________ (include the full file path). Flag question: Question 2 Question 22 pts For the following SQL statement, what would the command to inject to the variable $id if you want to retrieve all the entries of the table “users”? _______________________ SELECT first_name, last_name FROM users WHERE id = '$id' Flag question: Question 3 Question 32 pts ______________ is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic. Group of answer choices Message authentication Identification Verification User authentication Flag question: Question 4 Question 42 pts In a _________________ attack, an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric. Group of answer choices Trojan horse Denial-of-service (DoS/DDoS) SQL injection Cross-site Scripting (XSS) Flag question: Question 5 Question 52 pts How many keys are required for secure and private communication among n persons if symmetric encryption is used?
Group of answer choices n * (n-1) / 2 n! / 2 2n 2^n Flag question: Question 6 Question 62 pts 64 mod 10 = ______________ Group of answer choices 6 4 2 8 Flag question: Question 7 Question 72 pts Key distribution often involves the use of _____________ which are generated and distributed for temporary use between two parties. Group of answer choices session keys public key certificates private key certificates master keys Flag question: Question 8 Question 82 pts A common item of authentication information associated with a user and the user’s secrete knowledge is a ______________. Group of answer choices password
ticket timestamp nonce Flag question: Question 9 Question 92 pts If n = 7 x 13 = 91, Euler’s totient function (91) = ________________. Flag question: Question 10 Question 102 pts Key distribution often involves the use of __________ which are infrequently used and are long lasting. Group of answer choices master keys private key certificates session keys public key certificates Flag question: Question 11 Question 112 pts A ________________ is a password guessing program. Group of answer choices password cracker password salt password hash password biometric Flag question: Question 12 Question 122 pts Pick the strongest mechanism for user authentication from the list below. Group of answer choices
all of these together password smart card finger print smart card Flag question: Question 13 Question 132 pts How many key pairs are required for secure and private communication among n persons if asymmetric encryption is used? Group of answer choices n n/2 n * (n-1) /2 n! / 2 Flag question: Question 14 Question 142 pts The basic elements of access control are: subject, __________________, and access right. Flag question: Question 15 Question 152 pts Using Euler’s Theorem, 2723 mod 91 = _______________. Flag question: Question 16 Question 162 pts _________________ is verification that the credentials of a user or other system entity are valid. Group of answer choices Authentication Adequacy Authrorization
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help