logo

Crowdly

ICT379 Security Architectures and Systems Administration (tjd, 2025)

Шукаєте відповіді та рішення тестів для ICT379 Security Architectures and Systems Administration (tjd, 2025)? Перегляньте нашу велику колекцію перевірених відповідей для ICT379 Security Architectures and Systems Administration (tjd, 2025) в moodleprod.murdoch.edu.au.

Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!

IPSec 

a) Describe the process of the Diffie-Hellman Key Exchange protocol. What kind of attacks does it face? How to fix it to make it secure? (8 marks)

b) The Internet Security Protocol (IPSec) is widely used to secure the cloud network. IPSec can be implemented in a host-to-host transport mode as well as a network tunneling mode. Compare transport mode and tunnel mode.  (6 marks)

Переглянути це питання

Somebody created a modified Kerberos protocol. The figure below shows the exchange between Client and Service Server of the modified protocol (other parts as discussed in lecture are not shown here).

a) Explain one attack that may be applied specifically against this modified Kerberos protocol exchange shown below. (4 marks)

 

b) Explain how to fix the security issue in the modified Kerberos protocol. Your solution must be justified and refer to details of the protocol. (6 marks)

c) Discuss a practical requirement for this fix to work. (3 marks)

Переглянути це питання

This question is related to encryption modes.

a) Explain why choosing a proper encryption mode is very important even when using a symmetric block cipher that is secure, such as AES. (4 marks)

b) Describe a secure encryption mode that solves the problem and is efficient because it allows encrypting/decrypting blocks in parallel. (8 marks)

Переглянути це питання

Below are questions on the Windows System Administration. 

a) What is needed for a user to become a data recovery agent?  (4 marks)

b) Why is it important to use Encrypting File System (EFS)?  (4 marks)

c) If a file with important information is encrypted under EFS, but the creator has left the company. Is it possible to recover the encrypted data? If so, how? If not, why?  (6 marks)

Переглянути це питання

Design a two-factor

authentication system. Explain why it is securer than the traditional

password-based authentication.  

Переглянути це питання

This question is about password security.

a) Explain why many services and organisations require users to include numbers and special characters in passwords. (3 marks)

b) Assuming all users would choose random bit-strings as passwords (i.e. random passwords randomly generated by a password safe), discuss whether the mandatory inclusion of numbers and special characters increases security or not. Marks will only be given for a correct discussion and not for yes/no answers. (4 marks)

c) Proof your point from b) mathematically under the following simple assumptions: passwords must be exactly 10 characters long where each character is encoded as 1 byte, all 256 possible character values are accepted in passwords, and the password policy is that one of these characters must be a digit (0-9). (5 marks) 

Переглянути це питання

Where is an IPS commonly placed in a network?

0%
0%
100%
0%
Переглянути це питання

What type of the

access control system uses predefined rules and does not have the concept of a

resource owner?

0%
100%
0%
0%
Переглянути це питання

The AES uses a ____________ bit block size and a key size of __________ bits.

0%
0%
100%
0%
Переглянути це питання

The Diffie-Hellman key exchange protocol is vulnerable to _________. 

100%
0%
0%
0%
Переглянути це питання

Хочете миттєвий доступ до всіх перевірених відповідей на moodleprod.murdoch.edu.au?

Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!