10.10.0.10 Question 12 What value is configured in the DNS Servers: line? 10.10.0.10 Question 13 What is the default location for DHCP server backups? C:\windows\system32\DHCP\co-occurrence\ Question 14 What IP address is configured on the SEA-SVR2computer? 169.254.209.252 Question 15 What appears in the IP address text box? 10.10.0.55 Question 16 From which DHCP server are you receiving an IP address?
Which of the following would be the correct FQDN for a resource record in a reverse lookup zone, if the computer’s IP address is 10.75.143.88? a. 88.143.75.10.in-addr.arpa b. 10.75.143.88. in-addr.arpa c. in-addr.arpa.88.143.75.10 d. arpa.in-addr. 10.75.143.88 4.
8. A computer with a host IP address of 10.10.5.1 sends a data packet with a destination IP address of 10.10.52.2. A subnet mask of 255.255.255.0 is being used. Determine whether the packet stays in the LAN or is sent to the gateway. Show your work.
Multiple-choice questions 1. C. Represents one binary digit 2. B. Megabyte 3. C. 64 bits per quadruple word 4. A.
d. denial-of-service attack (an example: smurf attack) 4. What type of device guards against an attack in which a hacker modifies the IP source address in the packets he's issuing so that the transmission appears to belong to your network? b. proxy server 5. Which of the following devices can improve performance for certain applications, in addition to enhancing network security? b. proxy server 6.
What are 4 physical layer technologies being used in 802.1 wireless networking? 6. 7. Define a pseudorandom sequence as it applies to FHSS. The number sequence is random but actually repeats.
Everyone c. Authenticated User 8: Under which of the following conditions are Windows 7 local user accounts required to use complex passwords? a. When the computer is joined to a domain 9: Which of the following Windows 7 built-in local groups does not provide members with any additional privileges? a. Backup Operators 10: Which of the following is the default UAC setting for a computer that is not joined to an AD DS domain?
What information is not included in an Ethernet frame? A. Frame Size. 15. What is the minimum and maximum size of an Ethernet frame? Minimum- 64 bytes.
Step 1: Selects a random integer r in [1, n – 1] Step 2: Computes R = rG Step 3: Computes K = hrQB = (Kx, Ky), checks that K O Step 4: Computes keys k1||k2 = KDF(Kx) where KDF is a key derivation function, which derives cryptographic keys from a shared secret Computes c = ENCk1(m) where m is the message to be sent and ENC a symmetric encryption algorithm Step 5: Compute t = MACk2(c) where MAC is message authentication code Step 6: Sends (R, c, t) to Bob To decrypt a cipher text, Bob performs the following steps Step 1: Perform a partial key validation on R (check if R O, check if the coordinates of R are properly represented elements in Fq and check if R lies on the elliptic curve defined by a and b) Step 2: Computes KB = h.dB.R = (Kx, Ky ) , check K O Step 3: Compute k1, k2 = KDF (Kx) Step 4: Verify that t = MACk2(c) Step 5: Computes m = We can see that K = KB, since K = h.r.QB = h.r.dB.G = h.dB.r.G = h.dB.R = KB ECC Digital Signature: Alice, with domain parameters D = (q, FR, a, b, G, n, h), public key Q and private key d, does the following steps to sign the message m Step 1: Selects a Random number k [1, n – 1] Step 2: Computes Point kG = (x, y) and r = x mod n, if r = 0 then goto Step