icon

Usetutoringspotscode to get 8% OFF on your first order!

Network Management

Network Management

1. In real world, driver licenses are used to do authentication. Explain why a scanned-in digital copy of a driver license cannot be used by a server to authenticate the owner (of the driver license) and let him login into the server? (10 points)

2. Both encryption algorithms and hash algorithms transform messages, but why do encryption algorithms always require a key while hash algorithms do not? (10 points)

3. Please propose one method that uses a clock to generate one-time passwords. Please explain your method with sufficient details. (12 points)

4. Time-synchronized authentication can handle which of the following threats. Please choose ALL the threats that time-synchronized authentication can handle: __________ (10 points)
A) The long-term password is stolen by the hacker
B) Some used one-time passwords are stolen by the hacker
C) Replay attack
D) The clock is stolen
E) The hand-held authenticator is stolen

5. In challenge-response authentication, both the User ID (i.e., message 1) and the Challenge (i.e., message 2) are in cleartext, but why is challenge-response authentication still a secure authentication method that can defeat replay attacks? Please explain your reason with sufficient details. (13 points)

6. Assume Alice uses S/Key and a seed x to generate 200 one-time passwords for her to login into the EBay server. Please answer the following questions:

6.1: What is the 106th password that will be used for Alice to login into the EBay server? Please justify your answer with sufficient details. (15 points)

6.2: When Alice logins into the server the 6th time (i.e., when the 6th password used to login is used by Alice), what is stored in the EBay server’s password file? Please justify your answer with sufficient details. (15 points)

6.3: After the 22nd password used to login into the server is used by Alice, Mallory, the bad guy, steals her 87th password. Among the 200-22=178 passwords left for Alice to use, how many can still be used by Alice without worrying about attacks? Please justify your answer with sufficient details. (15 points)

37

You can leave a response, or trackback from your own site.

Leave a Reply

Network Management

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, one tool for each of the three network management areas. What is the best tool for each area? Can one tool be used for managing more than one area? Why or why not? Support your information and make sure all information sources are appropriately cited.

The paper must use APA 6th ed., 7th printing formatting and contain a title page, 3 to 5 pages of content, and a minimum of three peer-reviewed references

Watch the video for getting an idea.

http://www.youtube.com/watch?v=Z2Eg1EQsDEY

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes