2007:信息安全技术A卷).pdfVIP

  • 21
  • 0
  • 约3.01千字
  • 约 3页
  • 2017-04-25 发布于广东
  • 举报
2007:信息安全技术A卷).pdf

第- 1 -页 / 共 3页 中山大学软件学院 2 0 0 7 级软件工程专业 (2009秋季学期) 《信息安全技术》期末试题 (A卷) (考 试 形 式 : 开 卷 考 试 时 间 : 2 小 时) 《中山大学授予学士学位工作细则》第六条 考 试 作 弊 不 授 予 学 士 学 位 方向: 姓名: ______ 学号: Question 1(24 marks) Briefly define or explain each of the following terms_ 1、Confidentiality 2、integrity 3、RSA 4、S-box 5、Non-repudiation 6、MAC in Authentication 7、one-time pad 8、TLS/SSL Question 2 (32__ marks) This is a question about DES. 1. Briey describe what DES is? 2. Describe, in details, what is mangler function?what is the use? 3. Describe how the round keys for DES are generated?( you don’t need to write down the permutation) 4. What are weak keys and semi-weak keys_ Please include some example. Question 3 (24 marks) This is a question about basic of RSA. If Alice’s public key is (n,e)=(2539 ,13),where 2539=43(59) 1、 What is her private key? 2、Bob wants to send an encrypted message “sysu” to Alice based on her public key,what should Bob send Alice? Question 4 (20 marks) 警 示 第- 2 -页 / 共 3页 1. Which of the following would be an example of LOGICAL computer security? A. cable locking mechanism B. removable drive hot swap C. logon authentication schemes D. aluminum mesh case cover 2. Normal degradation of computer equipment over time would be considered a: A. Threat B. Risk C. Vulnerability D. Accident 3. What is the best way to permanently destroy/erase computer circuitry or media? A. reformat it several times B. do a memory bit dump C. set it on fire D. use high-powered magnets 4. What type of countermeasure would be most appropriate for network sniffing of passwords? A. placing alarm boxes along the cable lines B. installing biometric identification and authentication C. informing users to change their passwords D. encryption and dynamic passwords 5. What is the most commonly Provides a centralized authentication server to authenticate users to serve

文档评论(0)

1亿VIP精品文档

相关文档