CSS246 Tma Solutions

CSS246

Question: The five different methods for encrypting data are Data Encryption Standard, —, Skipjack, Capstone and Privacy Enhanced Mail
Answer: Algorithm

Question: According to security experts, the best way to protect any type of data is to — it
Answer: encrypt

Question: Electronic eavesdropping can be done on traditional telephone lines and satellite transmission networks through technologically advanced — devices
Answer: listening

Question: Good physical security is a combination of defensive principles designed to\ndeter, delay, detect, respond and ultimately — to intrusion to critical physical spaces
Answer: deny access

Question: Potential hazards to essential computer systems are disasters such as fire, — and earthquake \n
Answer: flood

Question: The three main components to physical security are method, obstacle and
Answer: surveilance and notification system

Question: The term PIR stands for
Answer: passive\ninfrared based technology

Question: Identity — is the use of another user’s information to pose as a false user
Answer: cloning

Question: The three methods Computer systems can use to determine if a person has a legitimate right to access asystem are who you are, what you know and —
Answer: what you have

Question: While on the network, — have a right to monitor their own systems and they have the right to be informed regarding such monitoring activities
Answer: employers

Whatsapp: 08039407882 for your Free Past Questions I Exam Summary I Free Past Tma Questions I To become a Tutor

Follow on Twitter for your Free Exams Summary I Online Tutorial I Projects Writeups

Leave a Reply

MEET OVER 2000 NOUN STUDENTS HERE. 

Join us for latest NOUN UPDATES and Free TMA answers posted by students on our Telegram. 

OUR ONLINE TUTORIAL CLASS IS NOW ON!!! JOIN US NOW. 
JOIN NOW!
close-link