Old Exam Flashcards
1
Q
why are detection techniques just as important as prevention techniques
A
cant rely on one, need to know what to do when something happens
2
Q
What does an information systems security policy specify
A
what needs to be secured
3
Q
Can the AES symetric cryptosystem be used to preform message authentication
A
yes
4
Q
In asymetrical key system, can the private key be used for message signing
A
yes
5
Q
what is the process of expressing access control policies in a computer sys called
A
authorization
6
Q
What are subjects that violate MAC rules on purpose called
A
trusted subjects
7
Q
What is a users permissions determined by in RBAC
A
their role in the organization