- Arts & Culture 6213
- Business & Economics 674
- Computers 316
- Dictionaries & Encyclopedias 74
- Education & Science 76877
- Abstracts 73
- Astrology 4
- Biology 8
- Chemistry 4046
- Coursework 15549
- Culture 8
- Diplomas 316
- Drawings 1595
- Ecology 5
- Economy 76
- English 80
- Ethics, Aesthetics 3
- For Education Students 17573
- Foreign Languages 11
- Geography 3
- Geology 1
- History 88
- Maps & Atlases 5
- Mathematics 12624
- Musical Literature 2
- Pedagogics 19
- Philosophy 22
- Physics 15120
- Political Science 5
- Practical Work 59
- Psychology 63
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sociology 9
- Summaries, Cribs 87
- Test Answers 160
- Tests 8747
- Textbooks for Colleges and Universities 32
- Theses 7
- To Help Graduate Students 14
- To Help the Entrant 38
- Vetting 385
- Works 13
- Информатика 8
- Engineering 893
- Fiction 706
- House, Family & Entertainment 84
- Law 129
- Website Promotion 68
Security of client operating systems Synergy
Uploaded: 06.09.2022
Content: Ответы Безопасность клиентских операционных систем Синергия.pdf 285,3 kB
Product description
Client operating system security answers to Synergy tests - score 73/100 points
1. Installing the licensed software is ...
2. Authorized access to information is ...
3. Information security, according to the legislation of the Russian Federation, is ...
4. The information sphere is ...
5. Subject Authentication is ...
6. It is not true that the sources of threats to information security include ...
7. The legal measures of computer security include ...
8. The organizational measures of computer security include ...
9. Information Security Product Certificate ...
10. The legal measures of computer security include ...
11. The policy of access to information is ...
12. The technical measures of computer security include ...
13. In the standard security policy, the installation of software products directly by the user of a corporate workstation ...
14. Confidentiality of information means ...
15. It is not true what types of malicious software are ...
16. It is not true that the main objectives of IS audit include ...
17. Arrange the stages of an information security audit in their logical order:
18. ... - a tracking tool placed on the user´s computer without his consent, control and notification
19. The main point of differentiating user access rights is ...
20. Risk analysis includes ...
21. Software that should not be available in the normal operation of the user - ...
22. Violation of the conditions stipulated by the license to carry out activities in the field of information protection (with the exception of information constituting a state secret) ...
23. Local security of an information system means ...
24. The information security system is ...
25. Subject identification is ...
26. The technical measures of computer security include ...
27. Subject authorization is ...
28. The security service used in distributed systems and networks is ...
29. The organizational measures of computer security include ...
30. Distinguishing ability of computer viruses from malicious
31. From the point of view of legislation (law), there is a level of access to information that ...
32. The system software includes:
33. It is not true that biometric data refers to ...
34. The operating system of a digital computing system designed to provide:
35. The main types of malicious impact on the system include ...
36. Information is ...
37. Hardware, software and technology can guarantee absolute reliability and security of data in computer systems ...
38. Information that cannot constitute an official or commercial secret is determined ...
39. Virus programs are usually divided by ...
40. Antivirus programs are distinguished by types ...
41. The directions in which information is protected by embedded methods of applied programs include ...
42. The European ITSEC safety criteria establish ... safety classes
43. The main types of intrusion detection systems include ...
44. The availability of information means ...
45. Virus programs are usually divided by ...
46. In accordance with the legislation, responsibility for illegal restriction of access to information and for violation of the information protection regime is borne by ...
47. According to the existing rules, only an enterprise that has ...
48. Unauthorized access to information is ...
49. Certification of encryption tools in the Russian Federation is carried out by ...
50. The modern computer organization was proposed by:
51. In the "Concept of protection of SVT and AS from unauthorized access to information" as the main means of protection against unauthorized access to information are considered ...
52. It is not true that the anti-virus modules include ...
53. The main means of penetration of viruses into the computer ...
54. The physical security of an information system means ...
55. Local security policies are applied on computers ...
Additional information
56. The European ITSEC criteria for information security include ...
57. The types of information with limited access include ...
58. Utilities of hidden management allow ...
59. The European ITSEC criteria for information security include ...
60. The user, (consumer) of information is ...
61. The right of access to information is ...
62. Integrity of information means ...
63. Information can be protected from ...
64. The types of information with limited access include ...
65. Utilities of hidden management allow ...
After purchase, you will receive answers to the questions that are indicated in the product description