(TCO A) What are the three types of user authentication? Name three examples of each type of authentication.
SEC 571 SEC571 Week 4 Midterm Answers
- (TCO A) What are the three types of user authentication? Name three examples of each type of authentication.
(TCO A) May a database contain two identical records without a negative effect on the integrity of the database? Why or why not?
(TCO B) Suppose you have a high capacity network connection coming into your home, and you also have a wireless network access point. Also suppose you do not use the full capacity of your network connection. List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network.
(TCO C) Respond to each part of this question:
a) Describe how a long number (encryption key) can be shared between sender and receiver without using any source that is obvious to outsiders and without directly sending the number from sender and receiver.
b) Describe how a long number (encryption key) can be shared between sender and receiver over an unsecured network without loss of confidentiality.
(TCO B) Which of the following is a correct statement?