Security of Internet Resources Answers Synergy Collecti

  • USD
    • RUB
    • USD
    • EUR
Affiliates: 0,01 $how to earn
i agree with "Terms for Customers"
Uploaded: 09.11.2020
Content: Ответы.zip 273,93 kB

Product description

Security of Internet Resources Answers Synergy Collecti


Internet resource security answers Synergy Collection of tests. Score 97/100 points.

IP includes ...
fragmentation
routing
transmission reliability

To protect against listening to traffic using a network analyzer, you can use ...
encryption of transmitted information
additional authentication
traffic filtering

The most frequent cases of information system security breaches are ...
viruses
staff errors
offended employees
outside attacks

To strengthen the security of your wireless network, you should ...
use encryption with unique keys
change factory SSID
protect SSNP protocol

It is not true that an IP header is added to the protocol packet ... from the TCP / IP stack
ICMP
ARP
DHCP

The level of technical protection of information is ...
degree of technical protection
information technical protection process
a set of methods and means of technical protection of information corresponding to the standardized indicators

The FTP command is ...
DIR
GET
LS
RNTO

Subnet mask 255.255.192.0 includes addresses: ...
193.29.179.40, 193.29.179.22
193.29.179.40, 193.29.179.81
193.29.179.40, 193.29.179.81, 193.29.92.64, 193.29.179.22
193.29.179.40, 193.29.92.64

Traffic between clients and servers on the internal network is best protected by ...
SAP
SSL
TPC

A set of data that allows you to put a public key with an object that has a corresponding private key is called ...
constructive certificate
access module
digital certificate

For centralized authentication, you can use ...
RADIUS
CONNECT
RETAIL

You can view the ARP table of the host (OC Windows NT) using the command ...
nbtstat -a
netstat –d
arp –a
arp -d

The means of technical protection of information include ...
technical means designed to prevent information leakage through one or more technical channels
hardware and software protection
firewalls

The most frequent case of information system security breach is ...
offended employees
computer viruses
outside attacks
staff errors

Access control is ...
protection of personnel and resources
response to attempts of unauthorized access
a way to protect information by regulating the use of resources (documents, hardware and software, database elements)

It is not true that UDP is characterized by ...
connectionless operation
floating window technique
the presence in the header of the field "checksum"

To specify the address of the recipient of the message, use the SMTP ...
SEND
HELO
POST
RCPT TO

It is not true that the correct MAC address is ...
00457FEB7777
FE6794C76890
FFFFFFFFFFFF

Authorization is a procedure for granting a subject ...
certain powers and resources in this system
specific identifier
providing the subject with a specific key pair

Traffic is ...
data link
the amount of information transmitted over the data transmission channel
set of messages transmitted over a telecommunication network

TCP / IP protocol stack levels:
applied (application), transport (transport), session (dalsatcom)
session (dalsatcom), transport (transport), network (internet)
applied (application), transport (transport), network (internet)

The TRACEROUTE command uses protocols ...
ARP and ICMP
ICMP
ICMP and UDP

When establishing communication via TCP, the first packet is sent with the flag set ... in the header
SYN
ACK
FYN

... the protocol implements cryptographic protection at the link layer
SSH
TCP
PPTP
SSL

When a user logs into a domain by entering their account details, it happens ...
identification
terminalization
authentication

It is not true that the TCP connection state is ...
SYN-SENT
LAST- ACK
LISTEN
WAIT

Telecommunications means ...
wired, fiber-optic and wireless connection of objects
a set of communication means providing data transfer between computers and information systems that are distant from each other at considerable distances;
set of technical means of transmission

Additional information

First of all, the route is viewed in the routing table ...

The network with the address 190.25.32.0 belongs to the class ...

Authentication is a verification procedure ...

The reaction of Windows operating systems to FIN scan in case of a closed port is ...

The TELNET service usually uses a port number ...

It is not true that IP refers to a function such as ...

The ICMP protocol includes the message "..."

To send broadcast messages to this network segment, the address is used ...

The number of routers to overcome is shown by the IP datagram header field ...

A packet transmitted via TCP is called ...

DNS can be attacked ...

Network adapter operating in selective mode ignores frames ...

The threat to the data transmission system is ...

Network scanners are programs that ...

Programs that scan large groups of computers on the Internet in search of those vulnerable to a particular type of attack are called ...

Computer attacks include ...

The basic law in the field of information protection is the Federal Law adopted at the beginning of 1995 "..."

The most frequent and most dangerous (in terms of the amount of damage) are ...

State information resources are

According to statistics, most network attacks are organized from under the operating system ...

Information classified as a state secret ...

A real firewalling system is usually required to "..."

The SKIP cryptokey management protocol was developed by Sun Microsystems in ...

Firewalls are ...

The multi-component screen includes ...

Shielding transport ...

War dialers are ...

It is not true that the means of combating IP – spoofing is ...

To automatically detect potential weaknesses within networks using various tests to check the response to unauthorized intrusions, ...

Network analyzers (sniffers) are programs that ...

Back Orifice is ...

An attack in which the attacking computer pretends to be a system that the "victim" trusts is called "..."

The network attack method, which is a combination of eavesdropping and IP spoofing´a, is called "..."

Information protection is ...

S / Key is an authentication protocol based on ...

SunScreen contains ... Ethernet adapters

Federal Law No. 139-FZ of July 28, 2012 - additions "on the protection of children" ...

The main advantages of shielding routers include ...

Shielding makes it possible to control information flows directed ...

Security policy means ...

Information resources are divided into ...

After purchase, you will receive the answers that are indicated in the product description

Feedback

0
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.