Completed Unit 4
1.) Identify and discuss the type of firewall architectures that are in use in your home, school, or place of employment.
2.) Describe the four types of authentication mechanisms.
3.) Describe an authentication mechanism with which you have familiarity that verifies the user’s identity by means of a password, passphrase, PIN or other unique authentication code.
4.) Explain why many reliable, effective biometric systems are perceived as being somewhat intrusive by users.
5.) Describe stateful inspection firewalls and explain how tables track the state and context of each exchanged packet.
– Learner successfully applied critical thinking to the case study analysis &
– Learner successfully incorporates a minimum of two per question scholarly sources to support their
position. (No more than 10% of the entire submission should be from referenced sources.
In other words, the references should support the learnerâ€™s work not be the bulk of what is
– Learner met the criteria for academic writing (i.e. no spelling or grammar errors, properly
formatted paragraphs, APA formatting used for references, etc.).
– Learner met per question 300 word count minimum.
One reference can be the reading material that is provided.
Whitman, M. E., & Mattord, H. J. (2013). Management of information security (4th ed.). Stamford, CT: Cengage Learning.
Please seperate the answers like the questions and place the reference at the end of them.