Description
see
Assignment 2
Deadline: Wednesday 12/11/2025 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name:
ID:
CRN:
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the
Assignment Template on Blackboard via the allocated folder. These files must not be in
compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces
between words, hide characters, use different character sets, convert text into image or languages other
than English or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on
the cover page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified
otherwise by the question.
• Late submission willRestricted
result in ZERO
– مقيدmark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Question One
Pg. 01
Learning
Outcome(s):
CLO4
Evaluate the
procedures to
secure a network
system against
failure, theft,
invasion and
sabotage.
Question One
2 Marks
What is RADIUS? How does the RADIUS server verify and authorize a user attempting
to access a network?
Answer:
Restricted – مقيد
Question Two
Pg. 02
Learning
Outcome(s):
CLO 2:
Demonstrate the
use of the security
tools and services
at the TCP/IP layer
model
Question Two
2 Marks
Explain the main differences between the Secure Sockets Layer (SSL) and Transport
Layer Security (TLS) protocols.
Your answer should include at least two distinctions in terms of protocol structure,
functionality, and security features.
Answer:
Restricted – مقيد
Question Three
Pg. 03
Learning
Outcome(s):
CLO3:
Recognize network
security issues,
including threat,
countermeasures,
malicious software
and intruders.
Question Three
2 Marks
Pick one cloud network security risk (e.g., unauthorized access, DDoS, data leak). Name
two controls to reduce it: one Technical and one Operational/Management. Write short
sentences for each control explaining how it helps.
Answer:
Restricted – مقيد
Question Four
Pg. 04
Learning
Outcome(s):
CLO3:
Recognize network
security issues,
including threat,
countermeasures,
malicious software
and intruders.
Question Four
2 Marks
List and briefly explain the three main security services defined in the IEEE 802.11i
Robust Security Network (RSN) specification.
Answer:
Restricted – مقيد
Purchase answer to see full
attachment