The expanded needham-schroeder protocol can be shortened to a 6-message protocol without loss of security by merely removing the 7thmessage. why is this true? (hint: the purpose of the 7thmessage is to prove to bob that he is talking to alice, but he already knows that. why?)

Answers

Answer 1
This is true since the ticket issued by KDC is enciphered by Alice's key, KAlice, so the one who can decrypt the fourth message and get the ticket to Bob is Alice only, which means that the one who is sending the ticket to Bob is Alice and nobody else.. (No one can get the ticket from the fourth message.)

Related Questions

When a windows computer starts, it initiates the stateless address autoconfiguration process, during which it assigns each interface a link-local unicast address. what is the order of steps involved in this autoconfiguration process?

Answers

1) The IPv6 implementation on the system construct a link-local address for
     each interface by using the fe80::/64 network address
2)  Using IPv6 Neighbor Discovery protocol, the system check if the
     address is a duplicate 
3) Knowing the link-local address is unique, it configures the interface to use
    that address
4) The system uses the Neighbor Discovery protocol to transmit Router
     Solicitation messages to the all routers multicast address 
5) The router on the link uses the ND protocol to relay Router
     Advertisement messages to the system 
6) By using the information it receives from the router, the system produce
    a routable address and configures the interface to use it 

An encrypted vpn link guarantees that the other end of the vpn connection is secure.
a. True
b. False

Answers

A-True
I hope this helps! :)

Answer:

The correct answer is letter "B": False.

Explanation:

Encrypted Virtual Private Networks (VPN) encode information so that only one computer with the correct decoder can read it so use it. The fact that one VPN is encoded does not imply that the VPN from where other user attempts to use it is encoded and secure. At least the encrypted VPN is safe but the other end is not unless encoded.

What type of device is characteristic of an enterprise environment?

Answers

A workstation used at an engineering firm.

the five steps in the fetch/execute cycle and how do they correspond to a restaurant

Answers

The five steps in the fetch/execute cycle are : 
1) Instruction Fetch (IF) - This starts with the moving from the memory to
     the control unit which is given by the program counter. The control unit
     can then access the data immediately from the memory.
2) Instruction Decode (ID) - what task the system has to do, where the
     results is to be stored and what operation is to be performed by which
     data.
3) Data Fetch (DF) - it gets the value from the memory.
4) Instruction Execute (IE) - The particular instruction is executed.
5) Result Return (RR) - The Result Value is restored in a
    particular memory location.  The return of new data resulting from
    (EX) that is put back into memory.

which of the following is not an advantage of using asynchronous data transmission

Answers

The following is not an advantage of using asynchronous data transmission :

a) Overhead of start and stop bits

b) False recognition of these bits due to noise on the channel

Answer:

Inexpensive software.

In the launch of the Space shuttle Discovery what does "auto sequence start" mean?

Answers

The countdown clock before a rocket launches is one of the most remarkable timepieces in the world. As indicated by the "T-minus" mark, the hours and minutes tick down to launch. “Auto sequence start” is a breakdown of some of the big milestones leading up to that final moment. If there are no technical issues, at T-minus 31 seconds, the ‘go’ command will be given “Auto sequence start” which means the Ground launch sequencer will hand off primary control. It will be handed off to the shuttle’s onboard computers.

should i get a razer phone or gpd win pls help!!?

Answers

I’m not sure what question you are asking

Which three states can be applied to switches using vlan trunking protocol (vtp)? select one:
a. transparent, server, and client
b. secure, transparent, and gateway
c. master, server, and client
d. open, closed, and active?

Answers

The answer is (A) transparent, server, and client

A switch can be configured in any of the above VTP modes.

Transparent: VTP transparent switches forward VTP ads that they receive out their trunk ports in VTP version 2. However, VTP transparent switches don’t participate in VTP.

Server: In this mode, you can create, modify and delete VLANs. You can also specify other parameters like VTP pruning and VTP version for the entire VTP domain.

Client: This mode behaves the same as server, but you cannot create, modify and delete VLANs on a VTP client.






Questions on blender
2. Which of the following is a special mode for making changes to a object? (1 point)

edit mode

mesh mode

landscape mode

drawing mode



3. Which of the following do extrusion tools duplicate while keeping the geometry connected with the original vertices? (1 point)

vertices

edges

faces

circles

Answers

I believe the answer for 2 is Edit mode and the answer for 3 is edges. But im not 100%. I hope this helps if not i hope you find the correct answer. 

If a dbms enforces a delete restrict option on the referential integrity constraint between client and agent in the happy insurance database, what will be the outcome after a user tries to delete the last record (a4, james, 3, 90, 2010, a3) from agent?

Answers

The answer is : CLIENT will have 7 records  AGENT will have 4 records.  If a dbms enforces a delete restrict option on the referential integrity constraint between client and agent in the happy insurance database, the outcome after a user tries to delete the last record (a4, james, 3, 90, 2010, a3) from agent is CLIENT will have 7 records  AGENT will have 4 records.       

What is the physical address of the logical address 8205?

Answers

 I don't understand your question, like what do you mean?

You have a usb storage device that you cannot get working. you have enabled all appropriate usb options in the latest 2.2 kernel but still cannot get your device working. what is most likely the source of the problem?

Answers

the device might have a problem eg: a faulty usb port , or maybe you stick requires 3.0 usb ports

Two major B2B models are ________. Select one: a. Auctions and social commerce b. Catalogs and vertical markets c. Sell-side marketplaces and e-sourcing d. Outsourcing and horizontal markets

Answers

the answer could be a i might be wrong
Answer:

The major two B2B models are c. e-sourcing and sell-side marketplaces.

Explanation:

B2B is a business to business model which means the exchange of goods or services which happens between corporations or organizations but not with customers. It is providing services or goods online to other company. Example, a cyber-security firm providing online service to an e-commerce company as part of risk mitigation plan to avoid credit card fraud.

The advantage of such model is sustainable and high-profit margin from repeated clients.

One disadvantage is this model will be having a smaller number of customers.

If you were given a 3D microscope to use for photography, which object(s) would you most want to photograph?

Answers

I would like to photograph a rose, because I have always been interested to know more about some flowers and what’s in the inside of them. Even though roses look pretty “simple” but beautiful in the outside, I suspect that there are a thousand of different things inside of it.

Answer and explanation:

Mainly, 3D microscopes are used in scientific research to observe the biologic composition of cells and microorganisms. If given the chance to use it to take some photographs, one good option could be to observe the cells of a zebrafish. Zebrafish have more than ten thousand (10,000) of cells that have the look of the sun's prominences. Comparing both of them could amaze us overall because of the difference in real sizes between but the similarity in shape.

Including AND in an IF statement means more than one condition can be included in the statement. exactly one condition can be included in the statement. the result may be both true and false at the same time. a new spreadsheet is generated using only data that meets the conditions in the statement

Answers

A. Just took the test.

Answer:

more than one condition can be included in the statement.

Explanation:

For example, if your mom tells you:

"You can only go out tonight if you do your homework and clean up your room"

The word and in the if condition is used to add another condition to the existant one, so the use of the word and in If statements is used to add more than one condition to the statement.

While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using

Answers

The answer is DMNNAMSVR.  While in an interactive nslookup session, one would use the DMNNAMSVR keyword to change the DNS server one is using.

how long does the Splunk search job remain active

Answers

When you run a new search job, the job is retained in the system for a period of time, called the job lifetime. f the job is not accessed within the specified lifetime, the job expires and is removed from the system. There are two lifetime settings, 10 minutes and 7 days. The lifetime starts from the moment the job is run.

You can upgrade a cpu by adding registers and cache memory to it.
a. True
b. False

Answers

False, to upgrade a CPU, you need to replace the CPU with a better CPU.

A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of:

Answers

The answer is Event.  A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of Event.

How do you calculate the total voltage in a series circuit with more than one component?

Answers

Voltage is the same across each component of the parallel circuit. The sum of the currents through each path is equal to the total current that flows from the source.

Voltage is the same across each component of the parallel circuit. The sum of the currents through each path is equal to the total current that flows from the source. You can find total resistance in a Parallel circuit with the following formula: 1/Rt = 1/R1 + 1/R2 + 1/R3 +...

Brittany is looking to advance in her current career. She is creating a plan to help strengthen and increase her skills. What question should she ask herself? What areas do I need to improve? What should I wear when I interview? When should I apply for a new job? Who do I know that can give me a better job?

Answers

Answer:

The correct answer is What area's do I need to improve.

Explanation:

This will help her alot

Answer:

A) What areas do I need to improve?

Explanation:

To strengthen her skills she needs to improve and be better.

Answer these questions and label each answer with the correct number.

1. List the stages in the technology design process.
2. What are prototypes used to test?
3. Why do engineers redesign a product after testing a prototype?
4. To whom do engineers communicate the solution?

Thanks!

Answers

1) Goals, specifications, model, and then public opinion about the product
2) Prototypes are used to test whether the product works like it is is supposed to, and for the public to be convinced that they are not wasting money on a product that does not work
3) Engineers fix flaws and any other problems that they could have came across. Also, redesigning can lead to improvements of the product
4) Engineers communicate with the company that hired them, or the government if applicable.

he technology design process, like scientific inquiry, does not always follow rigid steps. Often, engineers follow a common process: They identify a need, research the problem, design a solution, build and evaluate a prototype, troubleshoot and redesign, and communicate the solution.

A prototype is an early sample, model, or release of a product built to test a concept or process or to act as a thing to be replicated or learned from. ... A prototype is generally used to evaluate a new design to enhance precision by system analysts and users.

Engineers fix flaws and any other problems that they could have came across. Also, redesigning can lead to improvements of the product

Engineers find solutions to the problems faced by the society . Once the solution has been devised the engineers communicate it to the laborers and the workers so the implement it on field or on the work stations.

_____ describes the way the components in a network interact.​

Answers

Logical Topology describes the way that components in a network interact.  Logical topology is the arrangement of devices on a computer  network and how they communicate with one another.  It describes how signals act on the network.  his type of topology is not interested in how devices on the network are connected but how they communicate with each other. 

A logical topology is how devices appear connected to the user. A physical topology is how they are actually interconnected with wires and cables.

Your company is trying to get out of the responsibility of purchasing and hosting its own hardware so it won’t have to finance or manage a datacenter anymore. Your boss has told you that you need to install an operating system on all of the cloud-based servers. This is an example of what type of cloud computing?

Answers

Answer:

Software as a Service (SaaS).

Explanation:

   SaaS has been a strong trend in the business world. It is an acronym for Software as a Service, which means in our language software as a service.

    That is, they are online applications that can be used on your computer, tablet or mobile phone simply and remotely.

    It is a program that is not installed and that is used as a service by connecting to the Internet.

    As a service, it means that the customer does not purchase a license for a product but the right to enjoy the service offered.

    Therefore, all work related to the software is in the vendor's hands.

    Making a product available in SaaS format is a way of distributing content or technology solution in a more accessible and secure way.

    Software as a service may also be known by other names, such as web-based, on-demand, or hosted software.

    Netflix is a notorious example of SaaS that has gained prominence worldwide.

14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much easier? (1 point)

virtual reality

email marketing

video conferencing

social media



15. One of the elements that make the internet such a significant development is its ability to do which of the following? (1 point)

connect people all around the world

stream movies

offer ecommerce

share photos

Answers

14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much easier?
The correct answer is: social media

15. One of the elements that make the internet such a significant development is its ability to do which of the following? 
The correct answer is: connect people all around the world

References placed at the bottom of a page are known as _____.

Answers

sources, I don't think this is a computer question.
The references placed at the bottom of a page are known as citations. They are usually used to show were you have got evidence.

When a switch is closed, completing an lr series circuit, the time needed for the current to reach one half its maximum value is _____ time constants?

Answers

The answer is 0.693 .  When a switch is closed, completing an LR series circuit, the time needed for the current to reach one half its maximum value is 0.693   

e^(-t/T) = 0.5 
-t/T = ln(0.5) = -0.693 

12. Which of the following is CourseBit®? (1 point)

an online class focused on drawing for architectural purposes

a leading Moodle™ development and hosting provider that focuses on highly customized systems

an icon in Blender® that allows you to easily switch between screens

a widget with which all animators should be familiar



13. In Blender®, which interface principle corresponds to the user interface that allows a user to view all options and tools at a glance with pushing or dragging editors around? (1 point)

non-blocking

non-overlapping

non-modal

non-confrontational

Answers

12. Which of the following is CourseBit®? 
a leading Moodle™ development and hosting provider that focuses on highly customized systems

13. In Blender®, which interface principle corresponds to the user interface that allows a user to view all options and tools at a glance with pushing or dragging editors around?
non-overlapping

Hope this helps.

____ data updates in your destination document if there are changes to the source data
A) integrated
B) embedded
C) linked
D) field

Answers

I think its D (Field) I'm not sure but seems better than others.

Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and characters until a match occurs is known as ________.

Answers

The answer is Brute forcing.
Other Questions
Fifty-eight boys were asked if they play football and/or baseball. Thirty-one of them said they do not play baseball. Sixteen of them said they play football. Twenty of them said they do not play baseball or football. Match the following values to their correct places on the two-way table. The completion of the windmill poses a problem for Napoleon. What is it? Due to increasing concentrations of ddt as one moves up the food chain, cormorants and mergansers have about ______ times as much ddt residue as the background concentration in the water. Please help 10 points Cellular respiration in animals is necessary to transfer the chemical energy from sugar obtained from their food into ATP for use throughout the body. Which two systems work together to transport the sugar from food to the cells in the organisms brain? The perimeter of a circle is also known as what? what do all lipids have in common? Determine the concentration of an unknown acid or base in a neutralization reaction HELP ASAP!This graph shows Floridas population by age compared with the rest of the United States.According to the graph, which statements about Floridas population are true? Check all that apply.1. The number of young people in Florida is increasing compared to the rest of the United States, which shows a decline.2. Fewer retirement-age people live in Florida than in the rest of the United States.3. The percentage of people in Florida in the 1544 age range is greater than that in the rest of the United States.4. The percentage of people in Florida over the age of 55 is greater than that in the rest of the United States.5. The percentage of people in Florida in the 4554 age range is the same as in other states. Paraquat is a general herbicide that kills most types of plants. in a population of ferns, it was found that 40% of the gametophytes showed resistance to paraquat (resistance is caused by a recessive allele). what is the expected frequency of resistant sporophytes in this population?\ Adrian has been adding 6 cards to his sports card collection each week. He started with 20 cards. Let x be the number of weeks he saves cards. Which inequality would help him find the number of weeks it will take him to have more than 100 cards? Factor this trinomial completely.2x^2 + 10x + 8 A.2(x + 4)(x + 1) B.2(x 4)(x 1) C.2(x + 4)(x 1) D.2(x 4)(x + 1) Hey can you please help me posted picture of question the growth of feudalism in europe during the middle ages was primarily caused by the Factor x3 + 2x2 + x completely Secondary seismic waves (s waves) ______. are the slowest seismic waves travel through solids, liquids, and gases If (-3)^-5=1/x, what is the value x? Mis padres ____ tarde al almacn ayer.a. llegaronb. lleg What sultanate disseminated islamic beliefs with commercial power? A patient responds to a rorschach blot by saying it looks like a bat that has been squashed under the heel of a giant