- Arts & Culture 6209
- Business & Economics 674
- Computers 316
- Dictionaries & Encyclopedias 74
- Education & Science 76871
- Abstracts 73
- Astrology 4
- Biology 8
- Chemistry 4046
- Coursework 15549
- Culture 8
- Diplomas 316
- Drawings 1595
- Ecology 5
- Economy 76
- English 80
- Ethics, Aesthetics 3
- For Education Students 17567
- Foreign Languages 11
- Geography 3
- Geology 1
- History 88
- Maps & Atlases 5
- Mathematics 12624
- Musical Literature 2
- Pedagogics 19
- Philosophy 22
- Physics 15120
- Political Science 5
- Practical Work 59
- Psychology 63
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sociology 9
- Summaries, Cribs 87
- Test Answers 160
- Tests 8747
- Textbooks for Colleges and Universities 32
- Theses 7
- To Help Graduate Students 14
- To Help the Entrant 38
- Vetting 385
- Works 13
- Информатика 8
- Engineering 892
- Fiction 706
- House, Family & Entertainment 84
- Law 128
- Website Promotion 68
Engineering and technical protection of information Col
Refunds: 0
Uploaded: 10.11.2020
Content: Ответы Сборник.zip 229,75 kB
Product description
Engineering and technical protection of information Collection of answers, results from 70 to 100 points.
1. The types of information leakage channels include ...
subjective
objective
technical
material
2. The concept of a system of protection against information weapons should include ...
information weapon counterattack means
information weapon attack procedures
mechanisms for protecting users from various types and levels of threats to the national information infrastructure
signs that signal a possible attack
procedures for assessing the level and characteristics of an attack against national infrastructure as a whole and individual users
3. The form of information protection is ...
analytical
organizational and technical
insurance
legal
4. The symptoms of infection are ...
changing file length and creation date
decrease in system memory and free disk space for no apparent reason; periodic screen flickering
slowdown of programs, freezing and rebooting
5. Engineering and technical protection solves the problem of preventing or reducing threats caused by ...
spontaneous threat carriers
cybercriminals´ attempts to penetrate the storage sites of information sources by organized or accidental information leakage using various technical means
6. The controlled area is ...
object territory
territory of the object, where it is possible for unauthorized persons to stay
the territory of the object where uncontrolled presence of persons is excluded
7. An indicator of information security is ...
time required to break information security
threat prevention probability
time during which a certain level of security is provided
the likelihood of a threat to information security
8. The basic diagram of the information transmission system is:
transmitter - broadcast - receiver
source of information - communication channel - recipient of information
human - computer - human
9. The required minimum of virus protection includes ...
output control
prevention
incoming control
archiving
10. The electromagnetic channel of information leakage occurs due to ...
side electromagnetic radiation of technical means of information transmission
spurious emissions of technical means of information transmission
high-frequency irradiation of technical means of information transmission
11. The most important methods of protecting information from illegal access include ...
archiving (making backups)
use of special "electronic keys"
setting passwords for access to information
using antivirus software
encryption
12. Methods for identifying technical channels of information leakage include ...
instrumental control
physical search
testing
13. Species information is ...
information about the internal form of an intelligence object or document obtained with the help of technical intelligence equipment in the form of their images
information about the appearance of an intelligence object or document obtained with the help of technical intelligence equipment in the form of their images
information about the appearance of an intelligence object or document obtained using intelligence software in the form of their images
14. Technical information security is information security ...
by software and hardware
non-cryptographic methods
cryptographic methods
15. The most important methods of protecting information from erroneous user actions is ...
setting special file attributes
automatic request for confirmation of execution of a command or operation
file encryption
providing the ability to undo the last action
duplication of media
16. Auxiliary technical means and systems are means ...
and systems directly involved in the processing of restricted information
and systems not directly involved in the processing of information of limited access to telephone communications, computers
Additional information
17. Illegal collection, misappropriation and transfer of information constituting a commercial secret, causing damage to its owner is ...
18. Organizational and technical measures are measures that impose restrictions on ... the functioning of the protected object
19. Unmasking signs by the time of manifestation of signs include ...
20. Acoustic information is ...
21. Signs of the substance:
22. Means of engineering and technical protection are subdivided into:
23. Technical means of transferring information are technical means ...
24. A feature of voice messages is ...
25. The unmasking signs on the informativeness of signs include ...
26. The main types of attack detection systems ...
27. The unmasking features of the state of the object include ...
28. The tasks set within the framework of the national security concept are the priority development of domestic modern information and telecommunication technologies and ...
29. The object of protection may be ...
30. Physical protection systems are divided into:
31. The source of information in case of leakage through technical channels may be ...
32. Signal signs describe the parameters of fields and generating signals:
33. Species characteristics include:
34. Computer viruses can be classified by ...
35. FireWall is ...
36. Frequency of attestation checks for premises of the first and second groups:
37. The methods of protection along the vibration channel include ...
38. The parametric channel of information leakage arises due to ...
39. Attestation of allocated premises is a check of allocated premises and located in them ...
40. The unmasking features of the characteristics of the object include ...
41. Information leakage through technical channels is realized as a result of ...
42. Informativeness - a measure ... of a sign
43. When screening a room, it is used ...
After purchase, you will receive answers to the questions that are indicated in the product description
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |