Reference no: EM133540504
Assignment:
1. Which of the following statements are true?
Select one or more:
- In an asymmetric encryption scheme, a ciphertext is the result of running the decryption algorithm on a plaintext.
- Stateful inspection firewalls and dual-homed host firewalls are among the common firewall architectures.
- Signature-based method is one of the common detection methods for IDPSs.
- WPA has improved security compared to WEP.
- HTTPS is a prominent protocol for email security.
2. What is the difference between authentication and authorization? Can a system permit authorization without authentication? Why or why not?
3. In InfoSec, what is a firewall? How is an application layer firewall different from a packet filtering firewall? Why is an application layer firewall sometimes called a proxy server?
4. How does a network-based IDPS differ from a host-based IDPS?
5. What are the main components of cryptology?
6. Explain the relationship between plaintext and ciphertext.
7. Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management?
8. Caesar cipher: The following ciphertext was obtained via a Caesar cipher (i.e., shift cipher) with a shift of 13. Could you decrypt it?
GUR SVANY RKNZ JVYY GNXR CYNPR VA GUR ARKG ZBAGU.
9. If one encrypts the plaintext obtained from Question 7 via a Caesar cipher with a left shift of 6, then what would be the resulting ciphertext?
10. Examine the chain of public-key certificates associated with the website.