To view this notification widget you need to have JavaScript enabled. This notification widget was easily created with NotifySnack.

Additional Information

Site Information

 Loading... Please wait...

SEC 571 Midterm


Product Description

SEC 571 Midterm

(TCO A) What are the three types of user authentication? Name three examples of each type of authentication.

(TCO A) List and define five desirable qualities in a process designed to evaluate the trustworthiness of an operating system.


(TCO B) It's been said that firewalls are dead. Some think that, because of the prevalence of application-layer attacks, packet filtering firewalls are of no real use in protecting networks. Name three advantages of using packet filtering firewalls in modern networks.

(TCO C) Respond to each part of this question:

a) Describe how a long number (encryption key) can be shared between sender and receiver without using any source that is obvious to outsiders and without directly sending the number from sender and receiver.

b) Describe how a long number (encryption key) can be shared between sender and receiver over an unsecured network without loss of confidentiality.  


(TCO B) Which of the following is a correct statement?

Find Similar Products by Category

Click the button below to add the SEC 571 Midterm to your wish list.