Recent Question/Assignment

Assessment Details
Qualification Code/Title ICT50415 Diploma of Information Technology Networking
Assessment Type Assessment -02 ( Written Assessment) Time allowed
Due Date Location AHIC Term / Year
Unit of Competency
National Code/Title ICTNWK503 Install and maintain valid authentication processes
Student Details
Student Name Student ID
Student Declaration: I declare that the work submitted is my own, and has not been copied or plagiarised from any person or source. Signature: ____________________________
Date: _____/______/__________
Assessor Details
Assessor’s Name
RESULTS (Please Circle) SATISFACTORY NOT SATISFACTORY
Feedback to student:
...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Student Declaration: I declare that I have been assessed in this unit, and I have been advised of my result. I am also aware of my appeal rights.
Signature: _______________________________
Date: ______/_______/___________
Assessor Declaration: I declare that I have conducted a fair, valid, reliable and flexible assessment with this student, and I have provided appropriate feedback.
Signature: ________________________________________
Date: ______/_______/___________
Instructions to the Candidates
? This assessment is to be completed according to the instructions given below in this document.
? Should you not answer the tasks correctly, you will be given feedback on the results and gaps in knowledge. You will be entitled to one (1) resubmit in showing your competence with this unit.
? If you are not sure about any aspect of this assessment, please ask for clarification from your assessor.
? Please refer to the College re-submission and re-sit policy for more information.
? If you have questions and other concerns that may affect your performance in the Assessment, please inform the assessor immediately.
? Please read the Tasks carefully then complete all Tasks.
? To be deemed competent for this unit you must achieve a satisfactory result with tasks of this Assessment along with a satisfactory result for another Assessment.
? This is an Open book assessment which you will do in your own time but complete in the time designated by your assessor. Remember, that it must be your own work and if you use other sources then you must reference these appropriately.
? Resources required completing the assessment tasks are Learner guide, PowerPoint presentation, Unit Assessment Pack (UAP), Access to other learning materials such as textbooks, Access to a computer, the Internet and word-processing system such as MS Word.
? Submitted document must follow the given criteria. Font must be Times New Roman, Font size need to be 12 and line spacing has to be Single line.
? This is Individual Assessments. Once you have completed the assessment, please upload the softcopy of the Assessment into AHIC Moodle.
? Plagiarism is copying someone else’s work and submitting it as your own. Any Plagiarism will result in a mark of Zero.

Attempt ALL questions.
1. List the top three authentication methods. List the different types of encryption? Explain the process of symmetric encryption with appropriate diagram. (approximately 100 words)
Answer:
2. Identify the different types of biometrics system? What are some of the weaknesses of Finger print biometrics? (approximately 30 words)
Answer:
3. What are the strategic objectives for setting up Enterprise Security Plan? What are the factors involved in Authentication methods?
4. Write a short Notes on:
? challenge handshake authentication protocol (CHAP)
? challenge phrases
? password authentication protocol (PAP)
? remote authentication dial-in user service (RADIUS) authentication
(Approximately 100 words)
Answer:
5. What is brute force attack? What policies should you take to minimize this attack? ( Approximately 50 words)
Answer:
6. What is the difference between a first-party cookie and a third-party cookie? List and define the three actions an organization may take regarding risk. (approximately 100 words)
Answer:
7. List the function of proxy server? What are the differences between HTTP and HTTPS? (approximately 50 words)
Answer:
8. What is Access Control List? List the different types of Access Control List.
Answer:

9. List five characteristics to maintain Complex password policy.
Answer:

10. What is Kerberos? Write an example of using Kerberos.
Answer:

11. What is VPN? Discuss the two advantages of using VPN.
Answer:

12. Describe the principles of security tokens.
Answer:

13. What is digital certificate? Write a short note on a. Verisign b. X.509 c. SSL
Answer:

Looking for answers ?