Question 1: Explain each of the following symmetric key algorithms in 50-100 and list at least two (2) usages for each of symmetric key algorithms.*
Your answer
Question 2: Explain each of the below mention encryption types in 80-150 words*
Your answer
Question 3: Explain the functioning of “Digital signatures” in 100-150 words.*
Your answer
Question 4: Explain two (2) features of digital signatures. Write 100-150 for each function.*
Your answer
Question 5: Answer the below questions related to timestamp.
5A) Explain two (2) functions of timestamp. Explain each in 50-100 words.*
Your answer
5B) Summarise two features of timestamp.*
Your answer
Question 6: What do you understand by the term “Encryption strength”? Explain in 50-100 words.*
Your answer
Question 7: Explain each of following terms in 50-150 words.*
Your answer
Question 8: Explain the importance of reviewing helpdesk records to troubleshoot encryption issues. Explain in 40-80 words.*
Your answer
Question 9: What important information will you collect by reviewing system logs for encryption issues and compromises. Write your response in 50-100 words*
Your answer
Question 10: Explain each the following security threats in 50-100 words.*
Your answer
Question 11: Explain the term “Transmission Control Protocol” and its application in 150-200 words.*
Your answer
Question 12: Explain the following terms. (Each in 50-150 words).*
Your answer
Question 13: Explain each of the following certificate related infrastructure in 50-150 words?*
Your answer
Question 14: List three (3) most common asymmetric key algorithms and summarise their usages in 40-80 words*
Your answer
Question 15: What do you understand by reply attacks? Write your response in 100-150 words.*
Your answer
Question 16: List and explain five (5) security problems and challenges arise due to organisational issues?*
Your answer
Question 17: Summarise the features and functions of access control permission in 100-200 words.*
Your answer
Question 18: Explain the functioning and features of the following in 100-200 words for each.*
Your answer
Question 19: Summarise the features and functions of “One-way encryption”?*
Your answer
Question 20: List two techniques to analyse data security requirements.*
Your answer
Question 21: What are the essential information should include in a security plan. List any three (3).*
Your answer