Your Perfect Assignment is Just a Click Away
We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!


MT 460 INFA Mid Quiz Short and Long Answers

MT 460 INFA Mid Quiz Short and Long Answers

MT 460 INFA Mid Quiz Short and Long Answers

Short Answer: (3 points each)

  1. List and briefly describe the principal physical characteristics used for biometric identification.
  2. What is multi-factor authentication? Why does it provide better protection?
  3. What are the techniques to minimize password cracking?
  4. What are the categories of access controls? Define each category.
  5. How many keys are required for two people to communicate via a symmetric cipher?
  6. What is a public-key certificate? What is the need for public-key certificates?
  7. What is the difference between a private key and a secret key?
  8. Define the two types of symmetric key cryptography.
  9. What are the key features of the RSA algorithm?
  10. List the minimum security requirements in an information security program for protecting confidentiality, integrity, and availability.

Problems/Long Answer (7 points each)

  1. Why was it necessary to move beyond DES? Why has it been necessary to move beyond 3DES? Describe the encryption standard used to replace 3DES?
  2. Why are public-key algorithms usually used just to establish a symmetrically encrypted communications channel?
  3. A relatively new authentication proposal is the Secure Quick Reliable Login (SQRL). It is described at Briefly summarize how SQRL works and indicate how it fits into the categories of types of user authentication. Provide the benefits and identify any possible security issues with SQRL.
  4. What is the purpose of evaluating an IT product against a trusted computing evaluation standard?
  5. What properties must a hash function have to be useful for message authentication?
  6. What are the features of the NIST RBAC standards?
  7. Describe three types of password attacks. For each type of attack, provide an example of an authentication technique that can minimize or reduce the likelihood of the attack being successful.
  8. What are the challenges of biometrics?
  9. Provide a comparison of access control lists (ACL) and capability lists.
  10. Describe three commonly used security architectural frameworks, as discussed in class.

Course: MT 460 Management Policy and Strategy
School: Kaplan University


  • : 29/06/2017
  • : 40

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Sight Writers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Sight Writers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Sight Writers is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Sight Writers, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.