- Arts & Culture 5938
- Business & Economics 689
- Computers 310
- Dictionaries & Encyclopedias 81
- Education & Science 75858
- Abstracts 252
- Astrology 4
- Astronomy 1
- Biology 8
- Chemistry 2221
- Coursework 15546
- Culture 9
- Diplomas 411
- Drawings 574
- Ecology 5
- Economy 83
- English 75
- Ethics, Aesthetics 3
- For Education Students 17607
- Foreign Languages 11
- Geography 2
- Geology 1
- History 89
- Maps & Atlases 5
- Mathematics 13856
- Musical Literature 2
- Pedagogics 19
- Philosophy 23
- Physics 14841
- Political Science 5
- Practical Work 101
- Psychology 60
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sexology 42
- Sociology 9
- Summaries, Cribs 87
- Test Answers 150
- Tests 9243
- Textbooks for Colleges and Universities 32
- Theses 24
- To Help Graduate Students 14
- To Help the Entrant 37
- Vetting 364
- Works 13
- Информатика 10
- Engineering 3058
- Fiction 696
- House, Family & Entertainment 107
- Law 132
- Website Promotion 71
Information security. Test. (52 Issues).
Uploaded: 26.08.2014
Content: 40826151532653.rar 58,51 kB
Seller will give you a gift certificate in the amount of
Product description
The list of questions:
***** - This assignment subjects and objects of access identifiers and compare the presented identifier to the approved list.
***** - Is the process of encryption or decryption of information and the most powerful means of ensuring confidentiality.
*** - Is the process of authentication of arbitrary data presented in electronic form.
*** - It is a means of authentication, represents the hallmark of this person.
*** - Is a means of access authentication, which is a feature of the subject or object access.
***** Is a set of automated methods for identification and / or authentication of people based on their
physiological and behavioral characteristics.
Analysis of the accumulated information held operatively in real time or periodically, - is:
In the life cycle of information services are the following steps:
In the process of recovery planning are the following steps:
The structure of the digital certificate includes:
The main principles of the security architecture include:
Actions performed in the framework of existing powers, but violate the security policy - is:
Information infrastructure includes the following elements:
The upper level of the security policy solutions include:
By areas of physical security include:
The lower level of security policy solutions include:
To maintain the performance include the following areas:
For procedural information security include:
The middle level of security policy solutions include:
For physical infrastructure include:
The objectives of the program are top-level security:
The objectives of the program are low-level security:
The advantages of the signature of the method include:
The advantages of statistical methods include:
As viruses are classified according to the destructive capacity?
As viruses are classified according to infect the operating system?
As viruses are classified according to the characteristics of the algorithm work?
As viruses are classified according to the habitat?
What are the main properties have a computer virus?
Cryptographic techniques allow:
One and the same secret key is used and encryption, decryption and data used for:
Basic principles of personnel management are to:
The behavior of a user or component of the information system, which is malicious or atypical - is:
The policy should cover the average level, including the following topics:
The principle of minimizing privileges prescribes:
The principle of separation of duties provides:
Security program is described in the next number of levels:
The reaction to the violation of the security regime pursues the following main objectives:
Props electronic document designed to protect against counterfeiting, the resulting cryptographic transformation
information and allows you to identify the owner of the signature key certificate, as well as to establish the absence of distortion of information in a document - it is:
From a practical point of view, the security policy is appropriate to consider at
The collection and storage of information about events taking place in the information system - is:
Tools designed to identify vulnerabilities for the purpose of prompt responses - is:
Network with moderate confidence of security, which are submitted outside information services organizations - is:
The collection of documented decisions made by management and to protect the information and associated
It resources - is:
The set of conditions under which an attack is considered to be taking place, which is a predetermined reaction - is:
Means of access control customers from one set to another set of servers - is:
Trudnoobratimoe data conversion is generally realized by means of symmetric encryption with the binding of the blocks - is:
Additional information
Physical protection, which is among the measures of the procedural level, focused on:
Formation of the work program in the field of information security and ensure its implementation, while stressing the necessary resources
and controlling the state of affairs - this is the main goal of the measures
What is meant by information security?
What is data protection?
Screening is intended for:
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |