0% found this document useful (0 votes)
6 views

Intranet Homework

The document outlines key concepts related to intranets, including their definition, differences from the internet, and reasons for corporate use. It discusses security aspects such as website blocking, user ID roles, password creation, and encryption processes. Additionally, it highlights the safety of intranets from external hacking and the robustness of encryption methods.

Uploaded by

levi makokha
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Intranet Homework

The document outlines key concepts related to intranets, including their definition, differences from the internet, and reasons for corporate use. It discusses security aspects such as website blocking, user ID roles, password creation, and encryption processes. Additionally, it highlights the safety of intranets from external hacking and the robustness of encryption methods.

Uploaded by

levi makokha
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Homework

1. Define an intranet. How is it different from the internet in terms of usage


and security?

2. List three reasons why companies use intranets.

3. Explain why it is easier to block certain websites on an intranet compared


to the internet.

4. What are the key differences between an intranet and the internet?
Mention at least two.
5. Why are intranets considered safer from external hacking than the
internet?

6. Explain the role of a user ID in network security. What privileges might an


administrator have compared to a regular user?

7. Why is it important to use a combination of letters and numbers when


creating a password?

8. What happens if a user enters the wrong password multiple times on a


system?

9. Describe the process of encryption and explain how it helps protect


sensitive data.

10. Why are encryption keys and algorithms considered hard to break?
Provide an example of how encryption works.

You might also like