FOR ORDER THIS AND ANY OTHER COURSE,ASSIGNMENTS,QUIZES,EXAM,TEST BANKS OR SOLUTION MANUAL
CONTACT US AT WHISPERHILLS@GMAIL.COM
Question
Week 4 midterm
Question 1. (TCO A) What are the three types of user
authentication? Name three examples of each type of authentication.
Question 2. (TCO A) Cite a real-world database
situation in which the sensitivity of an aggregate is greater than that of its
constituent values.
Question 3. (TCO B) Suppose you have a high capacity
network connection coming into your home, and you also have a wireless network
access point. Also suppose you do not use the full
capacity of your network connection. List three reasons you might still want to
prevent an outsider obtaining free network access by intruding into your
wireless network.
a) Describe how a long number (encryption key) can be shared
between sender and receiver without using any source that is obvious to
outsiders and without directly sending the number from sender and receiver.
b) Describe how a long number (encryption key) can be shared
between sender and receiver over an unsecured network without loss of
confidentiality.
===============================================
No comments:
Post a Comment