This document outlines 4 questions for an assignment requiring a minimum 250 word response per question using APA style referencing and 100% original content. The questions cover describing 5 attacks on authentication systems, outlining the symmetric encryption process and its components, summarizing situations where file encryption is used, and describing categories of asymmetric encryption algorithms and their practical uses.