Explain the 4 ways to authenticate a user and supply an example of each?

Please select 5 questions to answer out of the 10 Provided.  Please submit a word file with your answers.  .

  1. Explain what Information Security is?

2. Explain the security triad?

3. Identify and explain/describe 3 common threats?

4. Explain each of the 7 layers of the OSI Model?

5. Explain the difference between symmetric and asymmetric encryption?

6. Explain how a firewall blocks/allows traffic?

7. Explain the 4 processes of access control?

· Identification

· Authentication

· Authorization

· Accountability

8. Explain the 3 principles of access control?

· Least Privileges

· Need to know

· Separation of duties

9. Explain the 4 ways to authenticate a user and supply an example of each?

· Something you know (One factor)

· Something you have (Two factor)

· Something you are (Three factor)

· Where you are (Four factor)

10. Explain the differences between an IDS and an IPS?

find the cost of your paper

select your top three ethics topics (in order of preference) from the list below and email your choices to me

CSCI 415 TERM PAPER TOPICS SELECTION – Spring 2020 Due Monday, February 7, 2021 (11:59pm)   Please select your top three ethics topics (in order of preference) from the list below and email your choices to me by Monday, February….

Identify products or systems on the Web that help organizations accomplish knowledge management.

Paper Section 1: Reflection and Literature Review Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have….

Which of the following is not an appropriate metadata element for a university Registrar’s Office?

1.The first step in the SDLC: Group of answer choices analysis design testing define goals and scope of the system 2.Any structure an organisation uses for organising, accessing, retrieving, storing and….