- Arts & Culture 6209
- Business & Economics 674
- Computers 316
- Dictionaries & Encyclopedias 74
- Education & Science 76835
- Abstracts 73
- Astrology 4
- Biology 8
- Chemistry 4010
- Coursework 15549
- Culture 8
- Diplomas 316
- Drawings 1595
- Ecology 5
- Economy 76
- English 80
- Ethics, Aesthetics 3
- For Education Students 17567
- Foreign Languages 11
- Geography 3
- Geology 1
- History 88
- Maps & Atlases 5
- Mathematics 12624
- Musical Literature 2
- Pedagogics 19
- Philosophy 22
- Physics 15120
- Political Science 5
- Practical Work 59
- Psychology 63
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sociology 9
- Summaries, Cribs 87
- Test Answers 160
- Tests 8747
- Textbooks for Colleges and Universities 32
- Theses 7
- To Help Graduate Students 14
- To Help the Entrant 38
- Vetting 385
- Works 13
- Информатика 8
- Engineering 892
- Fiction 706
- House, Family & Entertainment 84
- Law 128
- Website Promotion 68
Security of Internet resources (Synergy answers) 30 que
Refunds: 0
Uploaded: 09.11.2020
Content: Ответы 97.zip 262,33 kB
Product description
Security of Internet resources (Synergy answers) 30 questions RATING 97 points
Network scanners are programs that ...
detect easily guessed passwords in encrypted password files
listen to network traffic
collect information about the network
over the Internet (or network) block the operation of the entire remote computer or a separate program on it
Programs that scan large groups of computers on the Internet in search of those vulnerable to a particular type of attack are called ...
program vulnerability scanners
network scanners
password breakers
network analyzers (sniffers)
Computer attacks include ...
remote penetration into a computer: programs that gain unauthorized access to another computer over the Internet (or local network)
local penetration into a computer: programs that gain unauthorized access to the computer on which they are running
remote blocking of a computer: programs that, via the Internet (or a network), block the operation of the entire remote computer or a separate program on it (to restore operability, most often the computer must be restarted)
local computer blocking: programs that block the operation of the computer on which they are running
social traffic analysis
The basic law in the field of information protection is the Federal Law adopted at the beginning of 1995 "..."
About communication
About personal data
About information, informatization and information protection
The most frequent and most dangerous (in terms of the amount of damage) are ...
unintentional errors of users, operators, system administrators and other persons serving information systems
theft and forgery
deliberate attempts to gain unauthorized access through external communications
State information resources are
completely open and public without exception
completely closed
open and publicly available, but with the exclusion of documented information classified by law as a restricted access category
According to statistics, most network attacks are organized from under the operating system ...
Linux
Mac OS
Windows
FreeBSD
Information classified as a state secret ...
refers to confidential information
is part of restricted information
contains all types of protected information
A real firewalling system is usually required to "..."
ensure the security of the internal (protected) network and full control over external connections and communication sessions
have powerful and flexible controls to enforce the organization´s security policy as fully and as simply as possible
provide easy reconfiguration of the system when changing the network structure
have means of authorizing user access through external connections
reduce the vulnerability of internal security services
The SKIP cryptokey management protocol was developed by Sun Microsystems in ...
1990 year
1994 year
1997 year
2000 year
Firewalls are ...
password encryption software
inbound and outbound traffic control programs
scanners of PC or network vulnerabilities to certain types of attacks
programs for calling a large number of phone numbers in search of computers that handle incoming calls
The multi-component screen includes ...
external shield router
shielding gateway
internal shield router
external shielding gateway
Shielding transport ...
is a set of measures aimed at ensuring information security
maintains the integrity, availability, confidentiality of information and resources used for input, storage, processing and transmission of data
is a collection of documented management decisions aimed at protecting information and related resources
allows you to control the process of establishing virtual connections and the transfer of information over them
Additional information
War dialers are ...
password encryption software
inbound and outbound traffic control programs
scanners of PC or network vulnerabilities to certain types of attacks
programs for calling a large number of phone numbers in search of computers that handle incoming calls
It is not true that the means of combating IP – spoofing is ...
data encryption
complication of guessing sequence number
increasing the rate of change of sequence number on the server
firewall installation
To automatically detect potential weaknesses within networks using various tests to check the response to unauthorized intrusions, ...
Intranet Scanner
Firewall Scanner
RealSecure
Network analyzers (sniffers) are programs that ...
detect easily guessed passwords in encrypted password files
listen to network traffic
collect information about the network
over the Internet (or network) block the operation of the entire remote computer or a separate program on it
Back Orifice is ...
sophisticated online communication program with a wide variety of possibilities
an amplifier that allows an attacker to anonymously block the victim´s computer due to the arrival of a huge number of packets over the network
it is a sophisticated network scanning tool
a Trojan horse that allows a user to remotely control a Windows computer using a user-friendly graphical interface
An attack in which the attacking computer pretends to be a system that the "victim" trusts is called "..."
IP-spoofing (TCP TCP sequence number prediction)
DDOS
interception of a network stream (sniffing)
SQL injection
The network attack method, which is a combination of eavesdropping and IP spoofing´a, is called "..."
ACK-6ypa
IP Hijacking
ping flood
SYN flooding
Information protection is ...
a set of measures aimed at ensuring information security
maintaining the integrity, availability, confidentiality of information and resources used for input, storage, processing and transmission of data
resource system aimed at protecting against damage and loss of information
a set of documented management decisions aimed at protecting information and related resources
S / Key is an authentication protocol based on ...
reusable passwords
PIN code
one-time passwords
SunScreen contains ... Ethernet adapters
five
6
7
eight
Federal Law No. 139-FZ of July 28, 2012 - additions "on the protection of children" ...
implies the ability to block sites containing unlicensed content at the request of the copyright holder
led to the creation of the "Unified Register of Prohibited Sites"
linked to blocking extremist sites
The main advantages of shielding routers include ...
cheapness
transparency for more for higher levels of OB models!
unlimited analyzed information
strong protection provided
Shielding makes it possible to control information flows directed ...
only to the inner area
only to the outer area
to the inner and outer area
Security policy means ...
a set of measures aimed at ensuring information security
maintaining the integrity, availability, confidentiality of information and resources used for input, storage, processing and transmission of data
a resource system aimed at protecting against damage and loss of information
a set of documented management decisions aimed at protecting information and related resources
Information resources are divided into ...
state and non-state
state and cooperative
non-state and cooperative
To protect against listening to traffic using a network analyzer, you can use ...
encryption of transmitted information
additional authentication
traffic filtering
When a user logs into a domain by entering their account details, it happens ...
identification
terminalization
authentication
The most frequent case of information system security breach is ...
offended employees
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |