Download the CMST_301_Final Examination.docx file attached to this assignment.

  • Type your responses to the essay questions directly in the attached exam and save the file as: CMST_301_Final Examination.docx.
    • Submit the completed document to the Final Exam assignment folder 
  1. You must answer 4 of the 8 essay questions. Should you answer more than 4, only the first 4 will be graded. Each essay is worth 25 points for a total of 100 points for the exam. The exam is worth 20% of your final grade. Be sure you organize your response covering all the aspects of the questions.
  2. Length Requirement: Each essay response is required to be at least 500 words in length. Essay responses that are shorter will receive deductions based on how many words under (the farther from the designated length, the higher the deduction). Between 400-499 words, you will lose 5 points, under 400 words, you will lose 10 points.  Direct quotes do not count toward the word total. Please keep direct quotes to a minimum. Your response should be at least 90% original thought.   Also, I am expecting to see analysis and the synthesis of ideas in your essays (not just a manipulation of direct quotes with your words spliced in between). 
  3. Content Requirements: Content must be comprehensive, accurate, and persuasive. Your response should be at least 90% original thought.  Must use data from a minimum of two scholarly sources to support statements and draw a thorough and convincing conclusion from the data. 
  4. Bibliographical Requirement: Please do not use unprofessional sources such as Wikipedia, About.com, Answers.com, Dictionary.com, How.com, or anything remotely similar.  Examples of scholarly sources include our course content (e.g. Read & Watch resources), textbooks, journal articles, trade magazines, and conference proceedings. UMUC has a top-notch, extensive online library. You can find many scholarly sources there. Note: “Personal communications (e.g. Twitter Posts, Blogs, and YouTube Videos)” are not considered professional or scholarly sources.  Include at least TWO in-essay citations in EACH essay and a reference list at the END of each essay.
  5. Formatting Requirements
    • The paper must follow APA guidelines throughout.  See Course Content>Course Resources>Sample Paper to Show Appropriate Document Formatting.
    • Double-spaced (including the reference page) with the first line of each paragraph indented.
    • 1-inch Margins
    • 12 point professional font 
    • Begin each essay on a separate page
  6. This exam is **not** a group project. Your answers should be yours alone.
  7. Please spell-check your work.

Crypto

Write 500 words that respond to the following questions:  

  • What is the typical key size of a strong encryption system used on the Web today? Explain your answer with examples.
  • Explain the roles of the random numbers in the use of encryption for the security of web applications.
  • Provide at least two references to support your initial post.
  • Be in APA format including your references.
  • Be 500 words long (not including title and references).
  • Do not re-state the questions.
  • Include two sources (i.e. two references).
  • Respond to at least two of your fellow classmates.

IT-project management DQ4

 

You will be asked to fill various needs within an organization. Many decisions will be dictated by company policies. However, many will require you to make sound decisions based on your experience and ethics. Please address all the following in a prompt manner. How do you handle competing demands for your time?

  1. You need to install patches from Microsoft and reboot file/print server. How do you communicate this to your network clients and when do you perform the work?
  2. A developer says his application exited abruptly and he needs to get a report out today. He wants to run it from the computer room instead of his desk. How do you handle this request?
  3. The President of the company calls to let you know a new Vice President of Sales is starting today. He needs a network account and email account setup immediately for the new hire. He says that the new guy needs as account with all the same access as he has. How do you handle this request?

ne8dIS

describe a type of email threat and how a hacker can use it to get sensitive information.  How can a network administrator prevent this type of attach from happening?(300 WORDS)

cloud 12

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be include at least two references.

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

IT345 8

 Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources. 

 

Topics:

  • Do you believe we are too dependent on computers? Why or why not?
  • In what ways are we safer due to new technologies?
  • What are some recent examples of technology that has been created that is used to “save lives”?