using a pin or password in addition to TPM is an example of what type of authentication?
For unlimited access to Homework Help, a Homework+ subscription is required.
Question 4. [4 MARKS] You decide to save all your passwords in files, one password per file. You then decide you want to update your 6-character UTORid password, but you don't remember which of your password files you saved it in. Luckily, this is the only 6-character password you have so you decide to write a function to find the password and change it. Your code runs, but the function's body contains four bugs which will result in the function execution not matching its docstring description. In the space provided, rewrite the buggy lines with the bugs fixed. Do not add or remove any lines. def change password(files_list, new-password): " (list of str, str) -> str Preconditions: (1) files list is not empty. (2) Each file in files_list contains one single-line password. (3) All files in files_list contain passwords of different lengths. (4) Your 6-character password is guaranteed to be in one of these files. In the appropriate file from files_list, replace your 6-character password with new-password, and return your old password. #Code If you think a given line contains a bug, rewrite it. Otherwise leave it blank. found = True for filename in files list[:-1]: passwd_file = open(filename, 'r') first line = passwd_file.read() password = first line.strip("2") if password == 6: passwd_file.close() passwd_file = open(filename, 'w') passwd_file.write(new_password) found = True passwd_file.close() if found: # This is correct. Do not modify. return password
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a user name of admin and a password of admin. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of the device?
(a) With the aid of a practical example (two tables), explain the SQL statement below:SELECT FIRST_NAME, LAST_NAME, SCHOOL_FEE4FROM STUDENT, FEE_PAYMENTWHERE STUDENT.STUDENT_ID = FEE_PAYMENT.STUDENT_IDORDER BY FIRST_NAME AP(5)(b)Using the following passwords “ABCefg12” and “KojoGiggs12” as examples, discuss the strengths and weaknesses of each password and discuss what could be done to strengthen them, if they are weak passwords. AN(8)(c) Assuming your exam answer booklet for this course in the end of semester exams is flagged (indicated) by your antivirus as being infected with a virus but you have just about 5 hours to submit/upload your answer booklet to lemsas.net. Discuss what you would do to avoid not submitting your answer booklet and thereby not failing the course.