April
1999 QUESTION 4 Total Marks: 20 Marks |
Click here to access other
questions
Click to access
|
(a) | List two types of attack which are
possible over communication lines.
|
[2] |
(b) | Describe the security considerations
associated with twisted pair and coaxial cable.
|
[4] |
(c) | (i) List two services provided by a firewall. | [2] |
(ii) List two drawbacks associated with
firewalls.
|
[2] | |
(d) | Describe how biometrics devices are
used to provide positive identification.
|
[2] |
(e) | Describe how each of the following provide access control services. | [2] |
(i) Access control lists. | [2] | |
(ii) Logical networking controls.
|
||
(f) | Describe two forms of non-repudiation service. | [4] |