a server uses a challenge-response protocol to authenticate users. the server stores the legitimate users' public key. each time when a user wants to login, the server generates a random challenge and sends it to the user. the user then generates a digital signature on his/her workstation and sends the digital signature to the server. the server authenticates the user by verifying his/her signature on the random message. describe an attack against the server.
there is an alternative way of implementing dijkstra's algorithm that avoids use of the locator pattern but increases the space used for the priority queue, , from to for a weighted graph, , with vertices and edges. the main idea of this approach is simply to insert a new key-value pair, , each time the value for a vertex, , changes, without ever removing the old key-value pair for . this approach still works, even with multiple copies of each vertex being stored in , since the first copy of a vertex that is removed from is the copy with the smallest key. describe the other changes that would be needed to the description of dijsktra's algorithm for this approach to work. also, what is the running time of dijkstra's algorithm in this approach if we implement the priority queue, , with a heap?
in soa terminology, what does it mean if the production of a service is said to be encapsulated? group of answer choices the service description is documented in a short or concise form. the description of how to use the service is published using a standardized language. the users of the service need to know how and where the service is performed. the methodology and location of the service is private.
which of the following is/are true of use cases? select all that apply. a. use cases can be identified by reviewing the functional requirements. b. they contain all the information you need to build one part of a process model. c. use cases should be confirmed by users. d. use cases normally contain ten to twelve steps. e. use cases explain what the users want the new system to do.
if a server gets you to leave a larger tip by giving you an extra mint at the end of the meal, this demonstrates cialdini's principle of:
what sort of redundancy will result if we add attributes the primary-key attributes of its identifying entity set
write a c program that selects and displays the maximum value of 15 numbers to be entered when the program runs
speculate on the issue of allowing nested subprograms in programming languages - why are they not allowed in many contemporary languages?
which wireless connection standard supports a maximum speed of up to 1.3 gbps and has a range of up to 70 meters?
the data type that describes text, a combination of text and numbers, or numbers that are not used in calculations, such as a zip code is:
which gradient technique is more advantageous when the data is too big to handle in ram simultaneously?
mobile application network security can be improved by all except which one: group of answer choices pinning specific certificate ids enabling support for all versions of ssl/tls enabling only specific required cipher suites for your server
your 24u rack currently houses two 4u server systems. to prevent overheating, you've installed a rack-mounted environmental monitoring device within the rack. currently, the device shows that the temperature within the rack is 70 degrees fahrenheit (21 degrees celsius). what should you do?
which of the following characterize conditional statements? (select all that apply, omit those that do not) question 2 options: a) involve the else clause. b) can be extended in r using the break clause c) involve the if statement. d) involve a then statement. e) involve the for statement.
your computer is sharing information with a remote computer using the tcp/ip protocol. suddenly, the connection stops working and appears to hang. which command can you use to check the connection?