Q1. Compare and contrast symmetric and asymmetric key cryptography with examples.
Q2. The systems development lifecycle (SDLC) provides a standardized process for all phases of any system development. What are the different phases involved in SDLC give a brief note on all its phases in your own words.
Q3. What is network segmenting? List four different types of network segments and provide examples for each from your daily life.
Q4. In the table below, explain what would happen in every attack based on the severity level.