SEC571 Midterm Exam All Questions
Buy Now From Below:
Question 1. (TCO A) What are the three types of user authentication? Name three examples of each type of authentication.
Question 2. (TCO A) List and define five desirable qualities in a process designed to evaluate the trustworthiness of an operating system.
Question 3. (TCO B) Suppose you have a high capacity network connection coming into your home, and you also have a wireless network access point. Also suppose you do not use the full capacity of your network connection. List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network.
Question 4. (TCO C) Respond to each part of this question:
a) Describe how a long number (encryption key) can be shared between sender and receiver without using any source that is obvious to outsiders and without directly sending the number from sender and receiver.
b) Describe how a long number (encryption key) can be shared between sender and receiver over an unsecured network without loss of confidentiality.
Question 5. (TCO B) Which of the following is a correct statement?