Security of networks and data transmission channels Ans

  • USD
    • RUB
    • USD
    • EUR
Affiliates: 0,02 $how to earn
i agree with "Terms for Customers"
Sold: 1
Refunds: 0

Uploaded: 08.11.2020
Content: Ответы.zip 293,31 kB

Product description

Security of networks and data transmission channels Ans


Security of networks and data transmission channels - Answers 73 points

The most frequent case of information system security breach is ...
• offended employees
•computer viruses
• attacks from outside
• staff errors

A packet with the set flag ... in the header is sent first when establishing communication via TCP
• SYN
• ACK
• FYN

For centralized authentication, you can use ...
• RADIUS
• CONNECT
• RETAIL

Cryptographic protection at the link level is implemented by the ...
• PPTP
• SSL
• TCP
• SSH

Traffic is ...
• data transmission channel
• the amount of information transmitted over the data transmission channel
• a set of messages transmitted over the telecommunication network

A network adapter operating in selective mode ignores ...
• only frames that do not contain the address of this node in the "Recipient address" field
• frames that do not contain the address of this node in the "Destination address" field, as well as broadcast frames
• exclusively broadcast frames

Address ... is used to send broadcast messages on this network segment
• 255.255.255.255
• 192.32.64.255
• 255.255.255.
• 0 0.0.0.0

Telecommunications means ...
• wired, fiber-optic and wireless connection of objects
• a set of communication facilities providing data transfer between computers and information systems that are distant from each other at considerable distances;
• complex of technical means of information transmission

If the subnet mask is 255.255.192.0, then the addresses belong to one subnet ...
• 193.29.179.40, 193.29.179.81, 193.29.92.64 and 193.29.179.22
• 193.29.179.40 and 193.29.92.64
• 193.29.179.40 and 193.29.179.22
• 193.29.179.40 and 193.29.179.81

It is not true that ... is a characteristic of UDP
• work without connection establishment
• presence in the header of the "checksum" field
• floating window technique

When a user logs into a domain by entering their account details, it happens ...
• identification
• terminalization
• authentication

A threat to a data transmission system is ...
• information disclosure and service interruption
• theft, deletion or loss of information and / or other resources
• danger of distortion or modification of information
• danger consisting in the destruction of information or other resources

Authorization is a procedure for granting a subject ...
• providing the subject with certain powers and resources in this system of a certain identifier
• providing the subject with a certain key pair

The SMTP protocol command, which is used to specify the address of the recipient of the message, - ...
• HELO
• RCPT TO
• POST S
• END

The ... command is an FTP command
• DIR
• LS
• RNTO
• GET

Access control is ...
• protection of personnel and resources
• response to attempts of unauthorized access
• a way to protect information by regulating the use of resources (documents, hardware and software, database elements)

The means of technical protection of information include ...
• technical means designed to prevent information leakage through one or more technical channels
• hardware and software protection
• firewalls

Protocols ... are used by the TRACEROUTE command
• ICMP
• ICMP and UDP
• ARP and ICMP

Traffic between clients and servers on the internal network is best protected by ...
• SAP
• SSL
• TPC

Authentication is a verification procedure ...
• user by his identifier
• the authenticity of the claimed user, process or device
• user by name

The level of technical protection of information is ...
• degree of technical protection
• process of technical protection of information
• a set of methods and means of technical protection of information corresponding to the standardized indicators

The ICMP protocol includes the message ...
• Transfer complete
• Network unreachable
• PORT command successful
• RCVD WILL STATUS

S / Key is an authentication protocol based on ...
• PI

Additional information

It is not true that ... is the state of the TCP connection
• LISTEN
• LAST-ACK
• WAIT
• SYN-SENT

The network with the address 190.25.32.0 belongs to the class ...
• D
• C
• B
•AND

To strengthen the security of your wireless network, you should ...
• use encryption with unique keys
• change the factory SSID
• protect SSNP protocol

First of all, routes like "..."
• route to the network
• routing
• route to the node
• default route

To protect against listening to traffic using a network analyzer, you can use ...
• traffic filtering
• additional authentication
• encryption of transmitted information

Using the ... command in Windows NT, you can view the ARP table of the host
• arp -a
• arp -d
• nbtstat -a
• netstat -d

It is incorrect that an IP header is added to the protocol packet ... from the TCP / IP stack
• DHCP
• ICMP
• ARP


After purchase, you will receive answers to the questions that are indicated in the product description

Feedback

0
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.