Question 1: Discuss the need for authentication of users in restricting access to some critical data or systems.
Question 2: Why is it the responsibility of management to provide various process levels of access to data? what are the methods of control that are most commonly used?
Question 3: Should companies provide access to the data within the network from outside the network? if yes, what techniques need to be in place to say guard the data?
Question 4: Networks allow the possibility of access to multiple databases and application. Discuss the use of LAN manager, NT LAN manager and Kerberos in performing security control.
Question 5: Discuss the considerations when comparing remote authentication dial-in user (radius) and terminal access controller access -control system plus (tacacs+)