Almaty
Astana
Turkistan
100

List three types of firewalls

Packet-filtering firewalls

proxy firewalls

stateful inspection firewalls

100

What name is given to the encrypted text?

Cipher text

100

Define what biometrics is in information security mechanism

Biometrics refers to the measurement and statistical analysis of people's unique physical and behavioral characteristics. Examples include fingerprint recognition and facial recognition.

200

How do firewalls differ from antivirus software?

Firewalls monitor and control network traffic to prevent external threats, while antivirus software scans for and removes malware from individual devices.

200

We use the sender's public key to encrypt text in asymmetric encryption. True or False

False. We use receivers public key to encrypt text

200

Define the term physical security to information system

Physical security in the context of information systems refers to the protection of hardware, software, data, personnel, and network infrastructure from physical threats that could lead to unauthorized access, damage, theft, or destruction.

300

Explain how a firewall works to protect a network

A firewall monitors and controls incoming and outgoing network traffic based on security rules. It acts as a barrier between a trusted network and untrusted networks (like the internet), blocking potentially malicious traffic.

300

Compare symmetric and asymmetric encryption, including the advantages and disadvantages of each.

Symmetric encryption uses one key for both encryption and decryption, making it faster but less secure if the key is compromised. Asymmetric encryption uses two keys (public and private), enhancing security but is slower due to its complex algorithms.

300

Give two examples of biometrics

fingerprint scanner

face recognition software

retina scanner

voice recognition software

M
e
n
u