1. (TCO 2) Write a password policy that your company will have to follow to ensure strong passwords. (Points : 10)
Question 2.2. (TCO 2) Briefly describe a public key infrastructure (PKI). (Points : 10)
Question 3.3. (TCO 2) What does a disaster recovery plan (DRP) define? (Points : 10)
Question 4.4. (TCO 2) What are the various ways a backup can be conducted and stored? (Points : 10)
Question 5.5. (TCO 2) WEP is sometimes used to secure a wireless connection. What are the security issues related to WEP? (Points : 10)
Question 6.6. (TCO 3) List and describe three types of network topologies. (Points : 10)
Question 7.7. (TCO 3) What is NAT and what is it used for? (Points : 10)
Question 8.8. (TCO 4) What are the laws that govern computer access and trespass? (Points : 10)
Question 9.9. (TCO 5) Describe the laws that govern digital signatures. (Points : 10)
Question 10.10. (TCO 6) What are the different types of removable media? (Points : 10)
Question 11.11. (TCO 6) Explain very simply how biometrics works. (Points : 10)
Question 12.12. (TCO 6) What are the types of fire and their suppression methods? (Points : 10)
Question 13.13. (TCO 6) As a network administrator, what are some of the options you have for providing secure file transfer? (Points : 10)
Question 14.14. (TCO 7) What are some ethical issues associated with information security? (Points : 10)
Question 15.15. (TCO 9) What are the different methods of access management (MAC, DAC, RBAC)? (Points : 10)