亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? lianxiliu.txt

?? SSD2的答案 僅供參考 不要直接提交
?? TXT
字號:
Question 1. Malicious Email
Items a-g below are email scenarios where you are the receiver of the email. Answer the questions in each item and justify your answers.
a. You received an unexpected email with an attachment named, "SecurityPatches4You.exe", from an unknown sender. What type(s) of malicious code (virus, worm, or Trojan horse) may be included in the email? How did the email reach you? Would you open the attachment?
Answer :All the  virus, worm, or Trojan horse may included in the mail .
It may be sent by a hacker who want to get your information or want to use the data stored in your computer .It also maybe sent by a computer itself which infected virus ,worm ,or Trojan horse 
Of course not 
b. You received an unexpected email with an attachment named, "SecurityPatches4You.exe", from your friend Joe. What type(s) of malicious code (virus, worm, or Trojan horse) may be included in the email? How did the email reach you from Joe? Would you open the attachment?
Answer : All the  virus, worm, or Trojan horse may included in the mail .
 It maybe sent by Joe ,but it also maybe sent by a hacker who want to steal your data or information stored in your computer ,it also maybe sent by a computer itself which infected with virus ,worm ,or Trojan horse .
I will ask Joe first to make sure the mail by phone . 
c. You received an unexpected email with an attachment named, "finalDraft.doc", from your friend Joe. What type(s) of malicious code (virus, worm, or Trojan horse) may be included in the email? How did the email reach you from Joe? Would you open the attachment?
Answer : All the  virus, worm, or Trojan horse may included in the mail .
It maybe sent by Joe himself ,also there is a chance that Joe’s computer infected with virus ,worm so it sent itself to every address in the email address book of Joe’s computer .
d. You received an expected email with .doc attachment from your friend Joe (assume hidden extensions are exposed). What type(s) of malicious code (virus, worm, or Trojan horse) may be included in the email? How did the email reach you? What would you do and why?
Answer : All the  virus, worm, or Trojan horse may included in the mail .
It maybe sent by Joe ,but it also maybe sent by a hacker who want to steal your data or information stored in your computer ,it also maybe sent by a computer itself which infected with virus ,worm ,or Trojan horse .
I will ask Joe first to make sure the mail by phone .
e. You received an unexpected email with no attachment from your friend Joe. The email instructs you to click on the enclosed URL. What type(s) of malicious code (virus, worm, Trojan horse, or mobile code) may be included in the email? How did the email reach you fro Joe? What would you do and why?
Answer : Perhaps it includes no malicious code 
It maybe sent by Joe himself ,also there is a chance that Joe’s computer infected with virus ,worm so it sent itself to every address in the email address book of Joe’s computer .
I will not click on the enclosed URL .and I will ask Joe for sure .
Because it maybe sent by a hacker .
f. You received an unexpected, digitally signed email with no attachment from your friend Joe. The email instructs you to deposit $10,000 to Joe’s bank account. How did the email reach you? What would you do and why? 
Answer : It maybe sent by Joe himself , it also maybe sent by a hacker who use Joe’s address .
I will ask Joe first to make sure it ,then make a decision ,
Because it maybe sent by a hacker. 
g. You received an expected, digitally signed email without an attachment from your friend Joe. Joe also confirmed that he sent the email. The email instructs you to deposit $20,000 to Joe’s bank account. How did the email reach you? What would you do and why?
Answer : It maybe sent by Joe himself 
I will ask Joe first to make sure it ,then make a decision 
Question 2. Cryptography
In this section, you will encode/decode simple messages using different cryptography methods. 
a. Consider the alphabet shift cipher. Complete the following table: 
Plaintext	Encryption Technique	Ciphertext
Software	Shift right by 4 characters	 Wsjxaevi
 Systems	Shift right by 3 characters	Vbvwhpv

b. What is the maximum number of ways you can replace a character using the above alphabet shift cipher? What is the size of the key space? What is a weakness of the alphabet shift cipher above? 
Answer : 25  
It may be break by the brute force attack easily ,and it only provides limited number of ways 
c. How does using a secret passphrase as the encryption key compare to using the alphabet shift cipher?
 Answer : Using a passphrase to control the substitution cipher greatly expands the keyspace. With a passphrase n letters long, the keyspace is of size 26n, which grows very quickly with n.so that it can’t be broke by the hacker easily 
Let us try using a passphrase to encrypt the message "Meet at noon." with a larger key space. The key is "CBA". In this case, only encrypt alphabet letters. 
d. What is the encrypted message?
Answer : Pgfw cu qqpq 

Now let us explore how to use private/public keys and digital signature.
Suppose Jean is sending her friend Erin a secret note with a digital signature. 
e. How does Jean include a digital signature? What key does Jean use to encrypt the entire message including the digital signature? ]
Answer : To generate a digital signature, Jean would first generate a hash code of the message, and then encrypt the hash code using his private key to create a signature that is both unique to him and unique to that particular message.
Private key 
f. How does Erin decrypt the message, and verify that the message was from Jean?
Answer : When Erin receives the message, she can use Jean's public key to decrypt the digital signature and see the hash of the message. he can then compute the hash of the message. If the two hash codes were the same, the message had not been altered. Otherwise, either the message was altered during transmission, or it was not really signed by Jean.
Question 3. Trusting Web Sites
A new e-commerce company, eSale.com has launched. It sells named-brand clothing at discounted prices.
a. When you access the site, a certificate warning appeared, how would you go about deciding whether to accept the certificate or not? 
Answer : I will first check the detailed information ,such as the the name of the entity it identifies, an expiration date the digital signature of the issuing CA,and so on .if its information is not complete ,or the web sites is not famous ,I will not accept it .

b. You decided to trust the site, and input your personal information. After you have submitted your personal information, a page returned asking you to confirm the information on the page. How can you be sure that your information was served back through a secure connection? Answer : If the http or https is in sight ,then if the lock icon appears at the bottom right of the web page window ,I will sure my information is served back .
c. If a malicious intruder cracked your password and gained access to the site via your account, list two malicious activities the intruder can perform, and list two malicious activities the intruder cannot perform. Answer : He can use my password to my site ,he can scan the information in my site 
he can’t use my password to change my personal information 
he can’t use my passwoed to 
d. On the other side, as a network administrator working for eSale, list three actions you would perform after you found out that illegitimate users have been tampering with data on your site (assuming you already have a firewall)?
Answer : 

Question 4. Data Backups
Consider the process of restoring data to a server from backup media. Assume the server failed Friday, November 14, at 3:00 P.M.
For each backup procedure below, indicate what data is lost, and describe the procedures for restoring data. 
a. Full backup every Friday at 6:00 P.M. Answer : The data from last Friday’s full backup are all lost .
Restore the data from the hard disk .
b. Full backup every Friday at 6:00 P.M. and differential backup every Wednesday at 6:00 P.M. Answer : The data from last Friday’s full backup and the Wednesday’s siffedrential backup are lost .
I will restore the data from last Friday’s full backup and then  Wednesday’s seffirential backup 
c. Full backup every Friday at 6:00 P.M. and incremental backup every Monday, Tuesday, Wednesday, and Thursday at 6:00 P.M.
Answer : The data from last Friday’s full backup and the incremental backup from the Monday to Thursday are all lost .
First restore data from last Friday's full backup, then Monday’s differential ,then Tuesday’s differential ,then Wednesday's differential backup, and finally Thursday's incremental backup.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91精品国产91热久久久做人人| 国产日韩欧美高清在线| 26uuu国产日韩综合| 国产精品毛片久久久久久久| 视频一区欧美精品| 国产91丝袜在线播放0| 精品视频1区2区3区| 中文字幕日本不卡| 黄页视频在线91| 欧美午夜电影网| 国产精品久久精品日日| 日本欧美一区二区三区| 色综合色综合色综合色综合色综合 | 精品sm捆绑视频| 亚洲18色成人| 色婷婷综合久久久中文字幕| 久久久午夜电影| 麻豆91在线播放免费| 欧美日韩一区高清| 17c精品麻豆一区二区免费| 国产成人在线视频免费播放| 日韩欧美aaaaaa| 蜜桃传媒麻豆第一区在线观看| 一本到不卡免费一区二区| 中文一区在线播放| 丁香六月综合激情| 久久精品亚洲一区二区三区浴池| 六月丁香婷婷久久| 日韩一区二区电影在线| 同产精品九九九| 欧美二区乱c少妇| 五月天网站亚洲| 欧美日本一区二区三区四区| 一级特黄大欧美久久久| 在线观看区一区二| 亚洲在线免费播放| 91亚洲午夜精品久久久久久| 中文字幕日韩欧美一区二区三区| 不卡的电影网站| 中文字幕佐山爱一区二区免费| 成人av在线网| 国产精品色婷婷| a级精品国产片在线观看| 国产精品区一区二区三| 99这里只有精品| 亚洲美女在线一区| 欧美日韩一级黄| 日本v片在线高清不卡在线观看| 国产精品久久久久久久久免费丝袜 | 成人黄色a**站在线观看| 久久精品亚洲麻豆av一区二区| 看片网站欧美日韩| 久久蜜臀精品av| 成人小视频免费观看| 亚洲男人都懂的| 欧美日韩免费在线视频| 久久精品国产成人一区二区三区 | 欧美老女人在线| 久久电影网电视剧免费观看| 久久久久久夜精品精品免费| 成人av资源网站| 一区二区三区中文在线| 欧美精品在线视频| 国产综合久久久久影院| 国产精品―色哟哟| 欧美亚洲愉拍一区二区| 久久疯狂做爰流白浆xx| 亚洲丝袜制服诱惑| 欧美日本一道本在线视频| 蜜桃视频一区二区| 国产亚洲精品中文字幕| 91在线精品一区二区| 日本伊人午夜精品| 国产精品网站在线播放| 欧美美女视频在线观看| 成人爽a毛片一区二区免费| 亚洲国产日韩综合久久精品| 在线综合视频播放| 成人在线视频首页| 热久久国产精品| 成人欧美一区二区三区小说| 欧美日韩国产高清一区二区| 极品少妇xxxx偷拍精品少妇| 一区二区理论电影在线观看| 精品国产免费人成在线观看| 欧美在线视频你懂得| 国产成人免费av在线| 婷婷国产v国产偷v亚洲高清| 亚洲一区欧美一区| 国产欧美日韩视频在线观看| 欧美男人的天堂一二区| 91在线播放网址| 国产美女视频91| 热久久国产精品| 性久久久久久久| 精品国产免费久久| 91麻豆精品国产91久久久久| 国产精品亚洲午夜一区二区三区| 亚洲第一精品在线| 日韩美女视频一区| 欧美激情在线看| 精品成a人在线观看| 欧美一区二区三区喷汁尤物| 欧美亚洲高清一区| av色综合久久天堂av综合| 国产精品1区二区.| 国产精品一区二区不卡| 免费成人在线网站| 日日欢夜夜爽一区| 亚洲婷婷在线视频| 国产日产欧美精品一区二区三区| 日韩欧美资源站| 91精品国产91久久久久久最新毛片| 欧美少妇xxx| 欧美日韩成人一区二区| 欧美日韩免费电影| 欧美日韩在线一区二区| 欧美图区在线视频| 欧美婷婷六月丁香综合色| 精品视频一区三区九区| 欧美日韩视频在线一区二区| 欧美日韩电影一区| 欧美一级生活片| 欧美一区二区视频在线观看2022| 欧美日韩国产色站一区二区三区| 欧美精品一二三| 欧美一级欧美三级在线观看 | 91丨九色丨国产丨porny| 北岛玲一区二区三区四区| 成人久久视频在线观看| 91视频免费观看| 在线成人av网站| 精品国产伦理网| 国产精品久久久久影院老司| 亚洲精品久久嫩草网站秘色| 亚洲狠狠爱一区二区三区| 日本伊人色综合网| 日韩成人免费电影| 日本怡春院一区二区| 石原莉奈在线亚洲三区| 国产一区二区三区不卡在线观看 | 日韩精品一区二区三区三区免费| 精品少妇一区二区三区日产乱码 | 亚洲色图在线视频| 亚洲成av人片一区二区| 国内精品在线播放| 色诱视频网站一区| 日韩限制级电影在线观看| 国产网站一区二区三区| 亚洲成人7777| 国产黑丝在线一区二区三区| 精品污污网站免费看| 2023国产精品| 一区二区久久久久| 国内精品伊人久久久久av影院| 色欲综合视频天天天| 欧美videos中文字幕| 亚洲欧美另类综合偷拍| 久久福利视频一区二区| 91一区二区在线| 久久影院电视剧免费观看| 亚洲一区二区四区蜜桃| 九色综合国产一区二区三区| 色婷婷综合久久久久中文一区二区| 日韩欧美激情在线| 亚洲老司机在线| 国产精品69毛片高清亚洲| 91精品国产一区二区三区蜜臀| 最近日韩中文字幕| 国产在线麻豆精品观看| 3d成人动漫网站| 亚洲欧美韩国综合色| 国产盗摄精品一区二区三区在线| 欧美视频一二三区| 国产精品网站在线观看| 久久精品国产77777蜜臀| 成人精品视频.| 久久一夜天堂av一区二区三区| 亚洲一区免费视频| 日本韩国欧美在线| 欧美激情艳妇裸体舞| 久久精品理论片| 欧美高清一级片在线| 亚洲美女淫视频| 色综合久久88色综合天天免费| 久久青草国产手机看片福利盒子 | 91在线小视频| 国产欧美一二三区| 国产一区中文字幕| 精品精品国产高清一毛片一天堂| 日日夜夜免费精品视频| 精品视频999| 首页国产丝袜综合| 欧美视频一区二区三区在线观看| 亚洲色图制服诱惑| 91日韩在线专区| 依依成人综合视频| 91福利区一区二区三区| 亚洲精品国产无套在线观| 99国产精品久|