TASK 1

 

 

Question 1: Explain each of the following symmetric key algorithms in 50-100 and list at least two (2) usages for each of symmetric key algorithms.*

Captionless Image

Your answer

 

Question 2: Explain each of the below mention encryption types in 80-150 words*

Captionless Image

Your answer

 

Question 3: Explain the functioning of “Digital signatures” in 100-150 words.*

Your answer

 

Question 4: Explain two (2) features of digital signatures. Write 100-150 for each function.*

Your answer

 

Question 5: Answer the below questions related to timestamp.

5A) Explain two (2) functions of timestamp. Explain each in 50-100 words.*

Your answer

 

5B) Summarise two features of timestamp.*

Your answer

 

Question 6:  What do you understand by the term “Encryption strength”? Explain in 50-100 words.*

Your answer

 

Question 7: Explain each of following terms in 50-150 words.*

Captionless Image

Your answer

 

Question 8:  Explain the importance of reviewing helpdesk records to troubleshoot encryption issues. Explain in 40-80 words.*

Your answer

 

Question 9:  What important information will you collect by reviewing system logs for encryption issues and compromises. Write your response in 50-100 words*

Your answer

 

Question 10: Explain each the following security threats in 50-100 words.*

Captionless Image

Your answer

 

Question 11: Explain the term “Transmission Control Protocol” and its application in 150-200 words.*

Your answer

 

Question 12: Explain the following terms. (Each in 50-150 words).*

Captionless Image

Your answer

 

Question 13: Explain each of the following certificate related infrastructure in 50-150 words?*

Captionless Image

Your answer

 

Question 14: List three (3) most common asymmetric key algorithms and summarise their usages in 40-80 words*

Your answer

 

Question 15: What do you understand by reply attacks? Write your response in 100-150 words.*

Your answer

 

Question 16: List and explain five (5) security problems and challenges arise due to organisational issues?*

Your answer

 

Question 17: Summarise the features and functions of access control permission in 100-200 words.*

Your answer

 

Question 18: Explain the functioning and features of the following in 100-200 words for each.*

Captionless Image

Your answer

 

Question 19: Summarise the features and functions of “One-way encryption”?*

Your answer

 

Question 20: List two techniques to analyse data security requirements.*

Your answer

 

Question 21: What are the essential information should include in a security plan. List any three (3).*

Your answer

Order your essay today and save 10% with the discount code ESSAYHELP