Consider the following snippet of assembly code: lea     si…

Consider the following snippet of assembly code: lea     si, Start   ;  push   ecx pop     ecx mov  sp, 0682 ;  Decrypt: xor    【si】,si       ; xor    【si】,sp      ;  swap  eax, ebx swap  ebx, eax inc    si             ;  dec   sp             ;  jnz    Decrypt   ;  … Start:                 ;  1). It contains two types of virus: encrypted virus and [BLANK-1] virus. 2). Codes in lines 1, [BLANK-2], [BLANK-3], 6, 7, …, could be used as its virus signature. 3). How many encryption keys are used in this possible virus? There are [BLANK-4] keys. 4). Does this program have the anti-debug feature? [BLANK-5] (type ‘Yes’ or ‘No’) 5). What could be the best way to detect this possible virus? By releasing it in a [BLANK-6].

1. Why a file encrypted by Wannacry can be possibly recovere…

1. Why a file encrypted by Wannacry can be possibly recovered? 2. Consider the following FAT and root directory. Originally there were three files. A file named ‘quiz.doc’ was permanently deleted. List the ordered clusters that may store this file.The FAT of a laptop is like the following:2345678948700056And the root directory table:File 1File 7Homework1.docHomework2.doc23

There are two password systems:A. Your password must be six…

There are two password systems:A. Your password must be six pins. It must include characters from at least two of the following categories: numbers, capital letters, lower-case letters, and special characters from ~!@#$%^&*()B. Your password must be six pins. You can use numbers, capital letters, lower letters, and special characters from ~!@#$%^&*()Please answer the following questions:1. What is the search space for System B?2. From the system designer’s perspective, which system is safer? Why?  3. From a smart user’s perspective, which system is safer? Why?Instruction: if you want to launch the math editor, in this answer box, click the right corner of the toolbar, ‘Insert content.’ Then, click the first item, ‘Math.’