Questions from Business Communication


Q: What is a security hole, and how do you fix it

What is a security hole, and how do you fix it?

See Answer

Q: Explain how a Trojan horse works.

Explain how a Trojan horse works.

See Answer

Q: Compare and contrast symmetric and asymmetric encryption.

Compare and contrast symmetric and asymmetric encryption.

See Answer

Q: Name and describe the main impact areas. Who should be responsible

Name and describe the main impact areas. Who should be responsible for assessing what is meant by low/medium/high impact for each of the impact areas? Explain your answer.

See Answer

Q: Describe how symmetric encryption and decryption work.

Describe how symmetric encryption and decryption work.

See Answer

Q: Describe how asymmetric encryption and decryption work.

Describe how asymmetric encryption and decryption work.

See Answer

Q: What is key management?

What is key management?

See Answer

Q: How does DES differ from 3DES? From AES?

How does DES differ from 3DES? From AES?

See Answer

Q: Compare and contrast DES and public key encryption.

Compare and contrast DES and public key encryption.

See Answer

Q: Explain how authentication works.

Explain how authentication works.

See Answer