1. a. State four reasons why physical security is needed. 4 Marks
b. Discuss briefly the benefits and limitations of asymmetric key encryption. 5 Marks
c. Explain briefly the five steps undertaken in risk analysis 5 Marks
2. a. Describe the procedure involved in automatic password cracking algorithm. 6 Marks
b. Define the following terminologies:
(i) Patent 1 Mark
(ii) Trademark 1 Mark
(iii) Copyright 1 Mark
(iv) Trade Secret 1 Mark
(v) Privacy 1 Mark
c. One of the simplest ways to prevent attackers compromising the network is to customize the settings of the network. Customization of the network settings will give the network administrators an efficient means of monitoring network traffic. They can also put restrictions on the data, and the information exchanged over the network, to prevent exposure of the company’s network, thus preventing unknown, and unauthenticated, users from accessing the network. In this regard, describe the following components of network security:
(i) Firewall 2 Marks
(ii) Honeypot 2 Marks
3. a. Biometric measurements or personal attributes are used for authentication. These attributes are unique to the individual seeking to authenticate identification.
(i) List any four types of biometrics that are used for authentication 2 Marks
(ii) Discuss the two types of errors that occur when biometrics are used for authentication. 4 Marks
b. (i) Describe briefly the software package called PGP. 2 Marks
(ii) State three things that PGP is basically used for. 3 Marks
Select your paper details and see how much our professional writing services will cost.
Our custom human-written papers from top essay writers are always free from plagiarism.
Your data and payment info stay secured every time you get our help from an essay writer.
Your money is safe with us. If your plans change, you can get it sent back to your card.
We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.
Get instant answers to the questions that students ask most often.
See full FAQ