Suppose you have a high capacity network connection coming into your home, and you also have a wireless network access point. Also suppose you do not use the full capacity of your network connection. List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network

SE 571 Principles of Information Security and privacy Midterm Exam

  1. (TCO A) What are the three goals of security in computing? For each goal, list two controls that can be implemented to help achieve that goal.
  2. (TCO A) List and define five desirable qualities in a process designed to evaluate the trustworthiness of an operating system

  3. (TCO B) Suppose you have a high capacity network connection coming into your home, and you also have a wireless network access point. Also suppose you do not use the full capacity of your network connection. List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network

  4. (TCO C) Explain how a hashing algorithm works and how it can be used to provide authentication and data integrity

  5. (TCO B) Which of the following is a correct statement?

  6. (TCO A) What are the three types of user authentication? Name three examples of each type of authentication.

(TCO C) Respond to each part of this question:

a) Describe how a long number (encryption key) can be shared between sender and receiver without using any source that is obvious to outsiders and without directly sending the number from sender and receiver.
b) Describe how a long number (encryption key) can be shared between sender and receiver over an unsecured network without loss of confidentiality.

  1. (TCO A) May a database contain two identical records without a negative effect

on the integrity of the database? Why or why not?

  1. (TCO B) It’s been said that firewalls are dead. Some think that, because of the

prevalence of application-layer attacks, packet filtering firewalls are of no real

use in protecting networks. Name three advantages of using packet filtering

firewalls in modern networks.

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"

Superbprofessors

Recent Posts

case study one page case study one page case study one page case study one page case study one page

Case study one page Case study one page Case study one page Case study one…

2 years ago

business calculus quiz

Business Calculus quiz that is 10 questions and has an hour time limit. Must be…

2 years ago

hnif 355 disscussion post

Write a 175- to 265-word response to the following: What constitutes “robust interoperability,” and what…

2 years ago

news briefing quest 2

For this News Briefing Quest task , pick and analyze a U.S. political news article…

2 years ago

acc610 final project milestone two critical element ii analysis of financial statements

ACC 610 Milestone TwoGuidelines and Rubric This is the secondof three milestone assignments that will…

2 years ago

write in complete paragraphs 5 pages

Please answer the questions in the attachment. I have sent you the required materials. Send…

2 years ago