Security of Internet resources (Synergy answers) 30 que

  • USD
    • RUB
    • USD
    • EUR
Affiliates: 0,17 $how to earn
i agree with "Terms for Customers"
Sold: 1 last one 13.01.2022
Refunds: 0

Uploaded: 09.11.2020
Content: Ответы 97.zip 262,33 kB

Product description

Security of Internet resources (Synergy answers) 30 que


Security of Internet resources (Synergy answers) 30 questions RATING 97 points

Network scanners are programs that ...
detect easily guessed passwords in encrypted password files
listen to network traffic
collect information about the network
over the Internet (or network) block the operation of the entire remote computer or a separate program on it

Programs that scan large groups of computers on the Internet in search of those vulnerable to a particular type of attack are called ...
program vulnerability scanners
network scanners
password breakers
network analyzers (sniffers)

Computer attacks include ...
remote penetration into a computer: programs that gain unauthorized access to another computer over the Internet (or local network)
local penetration into a computer: programs that gain unauthorized access to the computer on which they are running
remote blocking of a computer: programs that, via the Internet (or a network), block the operation of the entire remote computer or a separate program on it (to restore operability, most often the computer must be restarted)
local computer blocking: programs that block the operation of the computer on which they are running
social traffic analysis
The basic law in the field of information protection is the Federal Law adopted at the beginning of 1995 "..."
About communication
About personal data
About information, informatization and information protection

The most frequent and most dangerous (in terms of the amount of damage) are ...
unintentional errors of users, operators, system administrators and other persons serving information systems
theft and forgery
deliberate attempts to gain unauthorized access through external communications

State information resources are
completely open and public without exception
completely closed
open and publicly available, but with the exclusion of documented information classified by law as a restricted access category

According to statistics, most network attacks are organized from under the operating system ...
Linux
Mac OS
Windows
FreeBSD

Information classified as a state secret ...
refers to confidential information
is part of restricted information
contains all types of protected information

A real firewalling system is usually required to "..."
ensure the security of the internal (protected) network and full control over external connections and communication sessions
have powerful and flexible controls to enforce the organization´s security policy as fully and as simply as possible
provide easy reconfiguration of the system when changing the network structure
have means of authorizing user access through external connections
reduce the vulnerability of internal security services

The SKIP cryptokey management protocol was developed by Sun Microsystems in ...
1990 year
1994 year
1997 year
2000 year

Firewalls are ...
password encryption software
inbound and outbound traffic control programs
scanners of PC or network vulnerabilities to certain types of attacks
programs for calling a large number of phone numbers in search of computers that handle incoming calls

The multi-component screen includes ...
external shield router
shielding gateway
internal shield router
external shielding gateway

Shielding transport ...
is a set of measures aimed at ensuring information security
maintains the integrity, availability, confidentiality of information and resources used for input, storage, processing and transmission of data
is a collection of documented management decisions aimed at protecting information and related resources
allows you to control the process of establishing virtual connections and the transfer of information over them

Additional information

War dialers are ...
password encryption software
inbound and outbound traffic control programs
scanners of PC or network vulnerabilities to certain types of attacks
programs for calling a large number of phone numbers in search of computers that handle incoming calls

It is not true that the means of combating IP – spoofing is ...
data encryption
complication of guessing sequence number
increasing the rate of change of sequence number on the server
firewall installation

To automatically detect potential weaknesses within networks using various tests to check the response to unauthorized intrusions, ...
Intranet Scanner
Firewall Scanner
RealSecure

Network analyzers (sniffers) are programs that ...
detect easily guessed passwords in encrypted password files
listen to network traffic
collect information about the network
over the Internet (or network) block the operation of the entire remote computer or a separate program on it

Back Orifice is ...
sophisticated online communication program with a wide variety of possibilities
an amplifier that allows an attacker to anonymously block the victim´s computer due to the arrival of a huge number of packets over the network
it is a sophisticated network scanning tool
a Trojan horse that allows a user to remotely control a Windows computer using a user-friendly graphical interface

An attack in which the attacking computer pretends to be a system that the "victim" trusts is called "..."
IP-spoofing (TCP TCP sequence number prediction)
DDOS
interception of a network stream (sniffing)
SQL injection

The network attack method, which is a combination of eavesdropping and IP spoofing´a, is called "..."
ACK-6ypa
IP Hijacking
ping flood
SYN flooding

Information protection is ...
a set of measures aimed at ensuring information security
maintaining the integrity, availability, confidentiality of information and resources used for input, storage, processing and transmission of data
resource system aimed at protecting against damage and loss of information
a set of documented management decisions aimed at protecting information and related resources

S / Key is an authentication protocol based on ...
reusable passwords
PIN code
one-time passwords

SunScreen contains ... Ethernet adapters
five
6
7
eight

Federal Law No. 139-FZ of July 28, 2012 - additions "on the protection of children" ...
implies the ability to block sites containing unlicensed content at the request of the copyright holder
led to the creation of the "Unified Register of Prohibited Sites"
linked to blocking extremist sites
The main advantages of shielding routers include ...
cheapness
transparency for more for higher levels of OB models!
unlimited analyzed information
strong protection provided

Shielding makes it possible to control information flows directed ...
only to the inner area
only to the outer area
to the inner and outer area

Security policy means ...
a set of measures aimed at ensuring information security
maintaining the integrity, availability, confidentiality of information and resources used for input, storage, processing and transmission of data
a resource system aimed at protecting against damage and loss of information
a set of documented management decisions aimed at protecting information and related resources

Information resources are divided into ...
state and non-state
state and cooperative
non-state and cooperative

To protect against listening to traffic using a network analyzer, you can use ...
encryption of transmitted information
additional authentication
traffic filtering


When a user logs into a domain by entering their account details, it happens ...
identification
terminalization
authentication

The most frequent case of information system security breach is ...
offended employees

Feedback

0
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.