Saturday 4 March 2017

DeVry Sec 571 Week 4 Midterm Exam-Latest 2017



FOR ORDER THIS AND ANY OTHER COURSE,ASSIGNMENTS,QUIZES,EXAM,TEST BANKS OR SOLUTION MANUAL  


CONTACT US AT WHISPERHILLS@GMAIL.COM



Question
Week 4 midterm
Question 1. (TCO A) What are the three types of user authentication? Name three examples of each type of authentication.
Question 2. (TCO A) Cite a real-world database situation in which the sensitivity of an aggregate is greater than that of its constituent values.
Question 3. (TCO B) Suppose you have a high capacity network connection coming into your home, and you also have a wireless network access point. Also suppose you do not use the full capacity of your network connection. List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network.
Question 4. (TCO C) Respond to each part of this question:
a) Describe how a long number (encryption key) can be shared between sender and receiver without using any source that is obvious to outsiders and without directly sending the number from sender and receiver.
b) Describe how a long number (encryption key) can be shared between sender and receiver over an unsecured network without loss of confidentiality.
Question 5. (TCO B) Which of the following is a correct statement?
The UDP protocol provides flow control for transport-layer communications.
The Kerberos authentication protocol requires that network servers' clocks be synchronized.
A rogue DNS server can be used to participate in a DHCP cache poison attack.
ARP is used to resolve MAC addresses to IP addresses.
Link encryption ensures that information is protected within the communicating systems.
===============================================


No comments:

Post a Comment