Info Sec Exam 2 Prep (Questions)
A user access log is an example of which category of Access Control?
Detective
What is the primary use of a password?
Authenticate the user
Which is the best know example of a symmetric key cipher?
DES
Which one of the following entities has the primary responsibility for determining access to a data file in a DAC environment?
The Owner
Which of the following is not part of an Access Control System Service?
Non-Repudiation
An employee attempts to navigate to a restricted website and receives a message that reads "This site is not approved by the company for access - Press OK to continue" This is an example of what type of control?
Technical
Which of the following is TRUE regarding symmetric cryptography:
The same key is used by both the sender (encryptor) and receiver (decryptor)