Questions from Business Communication


Q: How do you secure the network perimeter?

How do you secure the network perimeter?

See Answer

Q: Briefly outline the steps required to complete a risk assessment.

Briefly outline the steps required to complete a risk assessment.

See Answer

Q: What is physical security, and why is it important?

What is physical security, and why is it important?

See Answer

Q: What is eavesdropping in a computer security sense?

What is eavesdropping in a computer security sense?

See Answer

Q: What is a sniffer?

What is a sniffer?

See Answer

Q: What is a firewall?

What is a firewall?

See Answer

Q: How do the different types of firewalls work?

How do the different types of firewalls work?

See Answer

Q: What is IP spoofing?

What is IP spoofing?

See Answer

Q: What is a NAT firewall, and how does it work?

What is a NAT firewall, and how does it work?

See Answer

Q: What data compression standard uses Lempel–Ziv encoding? Describe how

What data compression standard uses Lempel–Ziv encoding? Describe how it works.

See Answer