Question One
Compare and contrast symmetric and asymmetric key cryptography with examples.
Question Two
The systems development lifecycle (SDLC)provides a standardized process for all phases of any system development. What are the different phases involved in SDLC give a brief note on all its phases in your own words.
Question Three
What is network segmenting? List four different types of network segments and provide examples for each from your daily life.
Question Four
In the table below, explain what would happen in every attack based on the severity level.
|
Ordinary
Impact is minimal
|
Medium
Impact is moderate
|
Severe
Impact is significant
|
Distributed denial service of attack
|
|
|
|
Social Engineering
|
|
|
|
Viruses/warms
|
|
|
|