TutorialWeek09_Ans - ITC482 Computer Management &...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Tutorial Week 09 - Solutions Tutorial Week 09 - Solutions Week 09: Protection Mechanisms Review Questions 1. What is the difference between authentication and authorization? Can a system permit authorization without authentication? Why or why not? Answer: Authentication is confirming the identity of the entity accessing a logical or physical area while authorization is determining what actions that entity can perform in that physical or logical area. A system can not permit authorization without authentication because it needs to know the identity of the entity to govern what authorization level that entity possesses. 2. What is the most widely accepted biometric authorization technology? Why do you think this is the case? Answer: Photo identification cards read my human guards or gatekeepers. It is low-cost and highly reliable. 3. What is the most effective biometric authorization technology? Why do you think this is the case? Answer: Iris scanning. It is very accurate, highly repeatable and moderately unobtrusive. 4. What is the typical relationship between the untrusted network, the firewall, and the trusted network? Answer: The untrusted network is also referred to as the outside world, such as the Internet. The trusted network is referred to as the inside world, which could be an organization’s internal network. The firewall is any device that prevents a specific type of information from moving between the untrusted network and the trusted network. 5. How is an application layer firewall different from a packet filtering firewall? Why is an application layer firewall sometimes called a proxy server? Answer: Application firewalls are dedicated computers separate from the first filtering router and are commonly used in conjunction with a second or internal filtering router. They are sometimes called a proxy server, because it serves as a proxy for external service request for internal services. A packet filtering firewall is a simple network device that filters packets by examining every packet header, accepting or rejecting packets as needed. 6. What special function does a cache server perform? Why does this function have value for larger organizations? Answer: A cache server stores the most recently accessed pages in an internal cache. This is beneficial to large companies since it can cut down on load and access times due to the pages being stored on a more local basis, therefore eliminating constant access to the outside improving load times and security. 7.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

TutorialWeek09_Ans - ITC482 Computer Management &...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online