Consider the following snippet of assembly code: lea si, Start ; push ecx pop ecx mov sp, 0682 ; Decrypt: xor 【si】,si ; xor 【si】,sp ; swap eax, ebx swap ebx, eax inc si ; dec sp ; jnz Decrypt ; … Start: ; 1). It contains two types of virus: encrypted virus and [BLANK-1] virus. 2). Codes in lines 1, [BLANK-2], [BLANK-3], 6, 7, …, could be used as its virus signature. 3). How many encryption keys are used in this possible virus? There are [BLANK-4] keys. 4). Does this program have the anti-debug feature? [BLANK-5] (type ‘Yes’ or ‘No’) 5). What could be the best way to detect this possible virus? By releasing it in a [BLANK-6].
Blog
A pin tumbler lock has 4 pin stacks with 4 levels. Suppose w…
A pin tumbler lock has 4 pin stacks with 4 levels. Suppose we already know the key blank it uses. What is the search space if lock picking is used to unlock it?
1. Why a file encrypted by Wannacry can be possibly recovere…
1. Why a file encrypted by Wannacry can be possibly recovered? 2. Consider the following FAT and root directory. Originally there were three files. A file named ‘quiz.doc’ was permanently deleted. List the ordered clusters that may store this file.The FAT of a laptop is like the following:2345678948700056And the root directory table:File 1File 7Homework1.docHomework2.doc23
1. In your opinion, what is the hottest IT technology nowada…
1. In your opinion, what is the hottest IT technology nowadays? 2. What can be a potential risk of using it? 3. Which security category does this risk belong to (C.I.A.A.A.A)? Explain if necessary.
There are two password systems:A. Your password must be six…
There are two password systems:A. Your password must be six pins. It must include characters from at least two of the following categories: numbers, capital letters, lower-case letters, and special characters from ~!@#$%^&*()B. Your password must be six pins. You can use numbers, capital letters, lower letters, and special characters from ~!@#$%^&*()Please answer the following questions:1. What is the search space for System B?2. From the system designer’s perspective, which system is safer? Why? 3. From a smart user’s perspective, which system is safer? Why?Instruction: if you want to launch the math editor, in this answer box, click the right corner of the toolbar, ‘Insert content.’ Then, click the first item, ‘Math.’
Which AWS Cloud architecture principle states that systems s…
Which AWS Cloud architecture principle states that systems should reduce interdependencies?
I still realize that I cannot turn in late work and that the…
I still realize that I cannot turn in late work and that there is no extra credit in this course, and I shouldn’t ask. 🙂
Which of the following is a principle when designing cloud-b…
Which of the following is a principle when designing cloud-based systems?
Your default VPC has three default subnets. How many Availab…
Your default VPC has three default subnets. How many Availability Zones are in this Region?
Which of the following statements is true regarding non-rela…
Which of the following statements is true regarding non-relational databases?