Old Exam Flashcards

1
Q

why are detection techniques just as important as prevention techniques

A

cant rely on one, need to know what to do when something happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does an information systems security policy specify

A

what needs to be secured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can the AES symetric cryptosystem be used to preform message authentication

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In asymetrical key system, can the private key be used for message signing

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the process of expressing access control policies in a computer sys called

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are subjects that violate MAC rules on purpose called

A

trusted subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a users permissions determined by in RBAC

A

their role in the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly