Information security. Test. (52 Issues).

The sale of this product is suspended.

Try to search similar items from other sellers.

Sold: 0
Uploaded: 26.08.2014
Content: 40826151532653.rar 58,51 kB
RD.Pro seller information
offlineAsk a question

Seller will give you a gift certificate in the amount of 0.08 $ for a positive review

Product description


The list of questions:
***** - This assignment subjects and objects of access identifiers and compare the presented identifier to the approved list.
***** - Is the process of encryption or decryption of information and the most powerful means of ensuring confidentiality.
*** - Is the process of authentication of arbitrary data presented in electronic form.
*** - It is a means of authentication, represents the hallmark of this person.
*** - Is a means of access authentication, which is a feature of the subject or object access.
***** Is a set of automated methods for identification and / or authentication of people based on their

physiological and behavioral characteristics.
Analysis of the accumulated information held operatively in real time or periodically, - is:
In the life cycle of information services are the following steps:
In the process of recovery planning are the following steps:
The structure of the digital certificate includes:
The main principles of the security architecture include:
Actions performed in the framework of existing powers, but violate the security policy - is:
Information infrastructure includes the following elements:
The upper level of the security policy solutions include:
By areas of physical security include:
The lower level of security policy solutions include:
To maintain the performance include the following areas:
For procedural information security include:
The middle level of security policy solutions include:
For physical infrastructure include:
The objectives of the program are top-level security:
The objectives of the program are low-level security:
The advantages of the signature of the method include:
The advantages of statistical methods include:
As viruses are classified according to the destructive capacity?
As viruses are classified according to infect the operating system?
As viruses are classified according to the characteristics of the algorithm work?
As viruses are classified according to the habitat?
What are the main properties have a computer virus?
Cryptographic techniques allow:
One and the same secret key is used and encryption, decryption and data used for:
Basic principles of personnel management are to:
The behavior of a user or component of the information system, which is malicious or atypical - is:
The policy should cover the average level, including the following topics:
The principle of minimizing privileges prescribes:
The principle of separation of duties provides:
Security program is described in the next number of levels:
The reaction to the violation of the security regime pursues the following main objectives:
Props electronic document designed to protect against counterfeiting, the resulting cryptographic transformation
information and allows you to identify the owner of the signature key certificate, as well as to establish the absence of distortion of information in a document - it is:
From a practical point of view, the security policy is appropriate to consider at
The collection and storage of information about events taking place in the information system - is:
Tools designed to identify vulnerabilities for the purpose of prompt responses - is:
Network with moderate confidence of security, which are submitted outside information services organizations - is:
The collection of documented decisions made by management and to protect the information and associated

It resources - is:
The set of conditions under which an attack is considered to be taking place, which is a predetermined reaction - is:
Means of access control customers from one set to another set of servers - is:
Trudnoobratimoe data conversion is generally realized by means of symmetric encryption with the binding of the blocks - is:

Additional information

Physical protection, which is among the measures of the procedural level, focused on:
Formation of the work program in the field of information security and ensure its implementation, while stressing the necessary resources
and controlling the state of affairs - this is the main goal of the measures
What is meant by information security?
What is data protection?
Screening is intended for:

Feedback

0
Period
1 month 3 months 12 months
0 0 0
0 0 0
Seller will give you a gift certificate in the amount of 0.08 $ for a positive review.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.