Answers to the test AMI MAP.Osnovy information security

Affiliates: 0,07 $how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 1 last one 15.09.2016
Refunds: 0

Uploaded: 16.12.2015
Content: Основы информационной безопасности.pdf 249,79 kB

Delivery Guaranteed

If you are unhappy with a product you purchased, the seller will return your money within 2 days from the moment of purchase.

Product description

1.K insider information security concerns:
2.Simvoly encrypted text is replaced by other characters taken from one or more
3. What is the security policy?
4. What statement is correct, if we look at the difference in order to security
5.Iskusstvennye information security threats caused by:
6. What should be the most important thing to consider in the management of data classification?
7. If different groups of users with different levels of access requires access to one
8.Antivirusy designed for specific viruses and based on the comparison code sequence
9. As the most important factor in order to ensure a successful security
10.Perehvat, which is based on fixation of electromagnetic radiation arising from the ...
11.Antivirus is a small resident program designed to detect
12.OCTAVE, NIST 800-30, and AS / NZS 4360 are different approaches to the implementation of control
13. What of the following is not the purpose of carrying out a risk analysis?
14.Antivirus provides search for viruses in main memory, on external media through
15.Aktivny interception interception is that:
16.Zaschita information is:
17.Antivirus not only finds infected files, but also removes from the body of the program file
18.Chto is CobiT and how it relates to the development of information security systems and programs
19.Chto was designed to help countries and their governments to build legislation
20.K major unintended artificial ASIP threats include:
21.Simvoly encrypted text are added sequentially with some special characters
22.CobiT was developed based on the structure of COSO. What are the main goals and objectives of COSO?
23.Perehvat that is to install a listening device in the hardware resources
24.Chto best describes the purpose of the calculation of ALE?
25.Simvoly encrypted text moves by certain rules inside the encrypted block
26.Estestvennye information security threats caused by:
27.Chto is the best description of quantitative risk analysis?
28.Spam which aims to discredit one or another firm, company, political candidate, etc:
29.Kto is the main responsible for determining the level of classification of information?
30. As the category is the most risky for the company in terms of probability
31.Kto ultimately responsible for ensuring that data is classified
32.Chto such a procedure?
33.Kogda advisable not to take any action in relation to the risks identified?
34. As of the above techniques is the most important when choosing a specific protective measures?
35.Takticheskoe planning - is:
36.Chto is the definition of exposure (exposure) for safety?
37.Effektivnaya security program requires a balanced application:
39.Kak calculate the residual risk?
38.Funktsionalnost Security defines the expected job security mechanisms
40.Chto of the above is not the task of leadership in the process of implementation and maintenance
42.Pochemu quantitative risk analysis in its pure form is not achievable?
41.Pochemu in the analysis of information risks must involve the specialists
44.Kakoy terms of the following legislation applies to a company or a person who performs
43.Esli uses automated tools to analyze risks, why do not care
45.Iz public domain consists of four CobiT?
46.Chto is ISO / IEC standard 27799?
47.Kakoy of the following methods of risk analysis attempts to determine where the most likely to happen
48.Zaschita information leakage prevention activities is:
49.K outsiders trespassing information security concerns:
50.Spam distributes fake messages on behalf of banks and financial companies, the purpose of
51.Antivirus remembers the initial state

Additional information

51 questions with answers in pdf format.


No feedback yet.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)