Multiple Choice
Three types of users that are considered in the design of a security system are ____.
A) manager user, technical user, and clerical user
B) technical user, authorized user, and privileged user
C) unauthorized user, registered user, and privileged user
D) supervisor user, administration user, and operational user
Correct Answer:

Verified
Correct Answer:
Verified
Q52: An integrity control that verifies the data
Q53: One of the first steps in designing
Q54: Since the design activities all interact with
Q55: It is just as important to have
Q56: A deployment diagram is most useful for
Q58: Symmetric key encryption uses a public key
Q59: Limiting user access to the system is
Q60: A major comparison between analsys and design
Q61: In user interface design the detailed screen
Q62: List the five primary activities that are