TutorialWeek09 - ITC482 Computer Management & Security...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Tutorial Week 09 Tutorial Week 09 Week 09: Protection Mechanisms Review Questions 1. What is the difference between authentication and authorization? Can a system permit authorization without authentication? Why or why not? 2. What is the most widely accepted biometric authorization technology? Why do you think this is the case? 3. What is the most effective biometric authorization technology? Why do you think this is the case? 4. What is the typical relationship between the untrusted network, the firewall, and the trusted network? 5. How is an application layer firewall different from a packet filtering firewall? Why is an application layer firewall sometimes called a proxy server? 6. What special function does a cache server perform? Why does this function have value for larger organizations? 7. How does screened-host firewall architecture differ from screened-subnet firewall architecture? Which offers more security for the information assets that remain on the
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

TutorialWeek09 - ITC482 Computer Management & Security...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online