August 2000 QUESTION 4 Total Marks: 15 Marks |
Click here to access other
questions
Click to access |
(a) Other than the access control, identify any three ways from which protection against software vulnerabilities can be achieved. [3] (b) Identify four ways in which link encryption and end-to-end encryption differ. [4] (c) Explain any two security concerns involved in wireless communication. [4] (d) Identify any two benefits of preventing
unauthorised users or intruders from |