- 21
- 0
- 约3.01千字
- 约 3页
- 2017-04-25 发布于广东
- 举报
2007:信息安全技术A卷).pdf
第- 1 -页 / 共 3页
中山大学软件学院 2 0 0 7 级软件工程专业 (2009秋季学期)
《信息安全技术》期末试题 (A卷)
(考 试 形 式 : 开 卷 考 试 时 间 : 2 小 时)
《中山大学授予学士学位工作细则》第六条
考 试 作 弊 不 授 予 学 士 学 位
方向: 姓名: ______ 学号:
Question 1(24 marks) Briefly define or explain each of the following terms_
1、Confidentiality
2、integrity
3、RSA
4、S-box
5、Non-repudiation
6、MAC in Authentication
7、one-time pad
8、TLS/SSL
Question 2 (32__ marks) This is a question about DES.
1. Briey describe what DES is?
2. Describe, in details, what is mangler function?what is the use?
3. Describe how the round keys for DES are generated?( you don’t need to write
down the permutation)
4. What are weak keys and semi-weak keys_ Please include some example.
Question 3 (24 marks) This is a question about basic of RSA.
If Alice’s public key is (n,e)=(2539 ,13),where 2539=43(59)
1、 What is her private key?
2、Bob wants to send an encrypted message “sysu” to Alice based on her
public key,what should Bob send Alice?
Question 4 (20 marks)
警 示
第- 2 -页 / 共 3页
1. Which of the following would be an example of LOGICAL computer security?
A. cable locking mechanism
B. removable drive hot swap
C. logon authentication schemes
D. aluminum mesh case cover
2. Normal degradation of computer equipment over time would be considered a:
A. Threat
B. Risk
C. Vulnerability
D. Accident
3. What is the best way to permanently destroy/erase computer circuitry or media?
A. reformat it several times
B. do a memory bit dump
C. set it on fire
D. use high-powered magnets
4. What type of countermeasure would be most appropriate for network sniffing of passwords?
A. placing alarm boxes along the cable lines
B. installing biometric identification and authentication
C. informing users to change their passwords
D. encryption and dynamic passwords
5. What is the most commonly Provides a centralized authentication server to authenticate users to
serve
原创力文档

文档评论(0)