Content: ОТВЕТЫ НА ТЕСТ.pdf (257.12 KB)
Uploaded: 09.08.2022

Positive responses: 0
Negative responses: 0

Sold: 0
Refunds: 0

$1.99
Answers to the test Security of Internet resources Synergy MIT / MY (TEST 97 POINTS)
1. Network scanners are programs that...
2. Programs that check large groups of computers on the Internet looking for those vulnerable to a particular type of attack are called ...
3. Computer attacks include ...
4. The basic law in the field of information protection is the Federal Law “...” adopted at the beginning of 1995.
5. The most frequent and most dangerous (in terms of the amount of damage) are ...
6. State information resources are
7. According to statistics, most network attacks are organized from under the operating system ...
8. Information classified as a state secret...
9. A real firewalling system is usually required to "..."
10. The SKIP crypto key management protocol was developed by Sun Microsystems in ...
11. Firewalls are...
12. Multi-piece screen includes...
13. Shielding transport...
14. War dialers are ...
15. It is not true that the means of combating IP-spoofing is ...
16. To automatically detect potential weaknesses within networks using various tests to test the response to unauthorized intrusions, ...
17. Network analyzers (sniffers) are programs that ...
18. Back Orifice is...
19. An attack in which the attacking computer impersonates a system that the "victim" trusts is called "..."
20. The network attack method, which is a combination of "eavesdropping" and 1P IP spoofing, is called "..."
21. Information security is...
22. S/Key is an authentication protocol based on...
23. The SunScreen device contains ... Ethernet adapters
24. Federal Law No. 139-FZ of July 28, 2012 - additions "on the protection of children" ...
25. Shielding makes it possible to control the information flows directed ...
26. Under the security policy is understood ...
27. Information resources are divided into ...
28. To protect against traffic eavesdropping using a network analyzer, ...
29. When a user logs into a domain by entering their account details, there is...
30. The most common case of violation of the security of an information system is ...
Answers to the test Security of Internet resources Synergy MIT / MY (COLLECTION OF TESTS 97 POINTS)
No feedback yet