- Arts & Culture 6212
- Business & Economics 674
- Computers 316
- Dictionaries & Encyclopedias 74
- Education & Science 76877
- Abstracts 73
- Astrology 4
- Biology 8
- Chemistry 4046
- Coursework 15549
- Culture 8
- Diplomas 316
- Drawings 1595
- Ecology 5
- Economy 76
- English 80
- Ethics, Aesthetics 3
- For Education Students 17573
- Foreign Languages 11
- Geography 3
- Geology 1
- History 88
- Maps & Atlases 5
- Mathematics 12624
- Musical Literature 2
- Pedagogics 19
- Philosophy 22
- Physics 15120
- Political Science 5
- Practical Work 59
- Psychology 63
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sociology 9
- Summaries, Cribs 87
- Test Answers 160
- Tests 8747
- Textbooks for Colleges and Universities 32
- Theses 7
- To Help Graduate Students 14
- To Help the Entrant 38
- Vetting 385
- Works 13
- Информатика 8
- Engineering 893
- Fiction 706
- House, Family & Entertainment 84
- Law 128
- Website Promotion 68
Security of Internet Resources Answers Synergy Collecti
Content: Ответы.zip 273,93 kB
Product description
Internet resource security answers Synergy Collection of tests. Score 97/100 points.
IP includes ...
fragmentation
routing
transmission reliability
To protect against listening to traffic using a network analyzer, you can use ...
encryption of transmitted information
additional authentication
traffic filtering
The most frequent cases of information system security breaches are ...
viruses
staff errors
offended employees
outside attacks
To strengthen the security of your wireless network, you should ...
use encryption with unique keys
change factory SSID
protect SSNP protocol
It is not true that an IP header is added to the protocol packet ... from the TCP / IP stack
ICMP
ARP
DHCP
The level of technical protection of information is ...
degree of technical protection
information technical protection process
a set of methods and means of technical protection of information corresponding to the standardized indicators
The FTP command is ...
DIR
GET
LS
RNTO
Subnet mask 255.255.192.0 includes addresses: ...
193.29.179.40, 193.29.179.22
193.29.179.40, 193.29.179.81
193.29.179.40, 193.29.179.81, 193.29.92.64, 193.29.179.22
193.29.179.40, 193.29.92.64
Traffic between clients and servers on the internal network is best protected by ...
SAP
SSL
TPC
A set of data that allows you to put a public key with an object that has a corresponding private key is called ...
constructive certificate
access module
digital certificate
For centralized authentication, you can use ...
RADIUS
CONNECT
RETAIL
You can view the ARP table of the host (OC Windows NT) using the command ...
nbtstat -a
netstat –d
arp –a
arp -d
The means of technical protection of information include ...
technical means designed to prevent information leakage through one or more technical channels
hardware and software protection
firewalls
The most frequent case of information system security breach is ...
offended employees
computer viruses
outside attacks
staff errors
Access control is ...
protection of personnel and resources
response to attempts of unauthorized access
a way to protect information by regulating the use of resources (documents, hardware and software, database elements)
It is not true that UDP is characterized by ...
connectionless operation
floating window technique
the presence in the header of the field "checksum"
To specify the address of the recipient of the message, use the SMTP ...
SEND
HELO
POST
RCPT TO
It is not true that the correct MAC address is ...
00457FEB7777
FE6794C76890
FFFFFFFFFFFF
Authorization is a procedure for granting a subject ...
certain powers and resources in this system
specific identifier
providing the subject with a specific key pair
Traffic is ...
data link
the amount of information transmitted over the data transmission channel
set of messages transmitted over a telecommunication network
TCP / IP protocol stack levels:
applied (application), transport (transport), session (dalsatcom)
session (dalsatcom), transport (transport), network (internet)
applied (application), transport (transport), network (internet)
The TRACEROUTE command uses protocols ...
ARP and ICMP
ICMP
ICMP and UDP
When establishing communication via TCP, the first packet is sent with the flag set ... in the header
SYN
ACK
FYN
... the protocol implements cryptographic protection at the link layer
SSH
TCP
PPTP
SSL
When a user logs into a domain by entering their account details, it happens ...
identification
terminalization
authentication
It is not true that the TCP connection state is ...
SYN-SENT
LAST- ACK
LISTEN
WAIT
Telecommunications means ...
wired, fiber-optic and wireless connection of objects
a set of communication means providing data transfer between computers and information systems that are distant from each other at considerable distances;
set of technical means of transmission
Additional information
First of all, the route is viewed in the routing table ...
The network with the address 190.25.32.0 belongs to the class ...
Authentication is a verification procedure ...
The reaction of Windows operating systems to FIN scan in case of a closed port is ...
The TELNET service usually uses a port number ...
It is not true that IP refers to a function such as ...
The ICMP protocol includes the message "..."
To send broadcast messages to this network segment, the address is used ...
The number of routers to overcome is shown by the IP datagram header field ...
A packet transmitted via TCP is called ...
DNS can be attacked ...
Network adapter operating in selective mode ignores frames ...
The threat to the data transmission system is ...
Network scanners are programs that ...
Programs that scan large groups of computers on the Internet in search of those vulnerable to a particular type of attack are called ...
Computer attacks include ...
The basic law in the field of information protection is the Federal Law adopted at the beginning of 1995 "..."
The most frequent and most dangerous (in terms of the amount of damage) are ...
State information resources are
According to statistics, most network attacks are organized from under the operating system ...
Information classified as a state secret ...
A real firewalling system is usually required to "..."
The SKIP cryptokey management protocol was developed by Sun Microsystems in ...
Firewalls are ...
The multi-component screen includes ...
Shielding transport ...
War dialers are ...
It is not true that the means of combating IP – spoofing is ...
To automatically detect potential weaknesses within networks using various tests to check the response to unauthorized intrusions, ...
Network analyzers (sniffers) are programs that ...
Back Orifice is ...
An attack in which the attacking computer pretends to be a system that the "victim" trusts is called "..."
The network attack method, which is a combination of eavesdropping and IP spoofing´a, is called "..."
Information protection is ...
S / Key is an authentication protocol based on ...
SunScreen contains ... Ethernet adapters
Federal Law No. 139-FZ of July 28, 2012 - additions "on the protection of children" ...
The main advantages of shielding routers include ...
Shielding makes it possible to control information flows directed ...
Security policy means ...
Information resources are divided into ...
After purchase, you will receive the answers that are indicated in the product description
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |