KEMBAR78
Assignment - Security | PDF
0% found this document useful (0 votes)
201 views1 page

Assignment - Security

The documents discusses various topics related to computer security including: 1. When files are deleted, the data is not immediately erased but marked as available for overwrite. This is why deleted files can sometimes be recovered. 2. Cookies are small files stored on a user's device that allow a web server to identify the user during sessions like staying logged in. 3. It could take up to 10,000 guesses to crack a 4-digit passcode if each guess takes 1 second, taking around 2 hours and 46 minutes. 4. It could take up to 10 million guesses to crack a 6-character password with numbers, uppercase/lowercase letters if each guess takes 1 second, taking around 11

Uploaded by

李知恩
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
201 views1 page

Assignment - Security

The documents discusses various topics related to computer security including: 1. When files are deleted, the data is not immediately erased but marked as available for overwrite. This is why deleted files can sometimes be recovered. 2. Cookies are small files stored on a user's device that allow a web server to identify the user during sessions like staying logged in. 3. It could take up to 10,000 guesses to crack a 4-digit passcode if each guess takes 1 second, taking around 2 hours and 46 minutes. 4. It could take up to 10 million guesses to crack a 6-character password with numbers, uppercase/lowercase letters if each guess takes 1 second, taking around 11

Uploaded by

李知恩
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

1.

In what sense are files not actually deleted even if you empty the recycle
bin on Windows or empty the trash on macOS?
______________________________________________________________________

2. Technically speaking, what is a cookie in the context of HTTP? And how,


using cookies, does a web server actually remember that you're logged in?
______________________________________________________________________

3. If a mobile phone is protected with a 4-symbol passcode, whereby each


symbol is a decimal number (0 through 9), how long might it take to guess
that passcode if each guess takes 1 second to check?
______________________________________________________________________

4. If a mobile phone is protected with a 6-symbol passcode, whereby each


symbol is a decimal number (0 through 9), an uppercase letter (A through
Z), or a lowercase letter (a through z), how long might it take to guess that
passcode if each guess takes 1 second to check?
______________________________________________________________________

5. While you might think it's more secure (and clever!) to use numbers that
resemble letters instead of the letters themselves in your password, it isn't
really. Why not?
e.g. "h4ck3r"
______________________________________________________________________

6. Suppose you've forgotten your password to some website. Even though


you can likely reset your password via a link on the website, odds are no
one at the company can actually tell you your forgotten password. Why
not?
______________________________________________________________________

7. What does it mean if a website requires two-factor authentication? What


might those two factors be?
______________________________________________________________________

8. Suppose that you're visiting a country in which some website is blocked.


How, technically, might using a VPN allow you to visit that website
nonetheless?
______________________________________________________________________

9. Gur nafjre vf 42.


______________________________________________________________________

You might also like