- Arts & Culture 5951
- Business & Economics 689
- Computers 317
- Dictionaries & Encyclopedias 81
- Education & Science 76476
- Abstracts 252
- Astrology 4
- Astronomy 1
- Biology 8
- Chemistry 2513
- Coursework 15782
- Culture 9
- Diplomas 411
- Drawings 571
- Ecology 6
- Economy 82
- English 77
- Ethics, Aesthetics 3
- For Education Students 17626
- Foreign Languages 11
- Geography 3
- Geology 1
- History 89
- Maps & Atlases 5
- Mathematics 13871
- Musical Literature 2
- Pedagogics 19
- Philosophy 23
- Physics 14894
- Political Science 5
- Practical Work 101
- Psychology 60
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sexology 42
- Sociology 9
- Summaries, Cribs 87
- Test Answers 151
- Tests 9245
- Textbooks for Colleges and Universities 32
- Theses 24
- To Help Graduate Students 14
- To Help the Entrant 37
- Vetting 364
- Works 13
- Информатика 10
- Engineering 3062
- Fiction 696
- House, Family & Entertainment 107
- Law 132
- Website Promotion 71
Security of Internet resources answers Synergy (97/100)
Uploaded: 09.08.2022
Content: ОТВЕТЫ НА ТЕСТ.pdf 257,12 kB
Product description
Answers to the test Security of Internet resources Synergy MIT / MY (TEST 97 POINTS)
1. Network scanners are programs that...
2. Programs that check large groups of computers on the Internet looking for those vulnerable to a particular type of attack are called ...
3. Computer attacks include ...
4. The basic law in the field of information protection is the Federal Law “...” adopted at the beginning of 1995.
5. The most frequent and most dangerous (in terms of the amount of damage) are ...
6. State information resources are
7. According to statistics, most network attacks are organized from under the operating system ...
8. Information classified as a state secret...
9. A real firewalling system is usually required to "..."
10. The SKIP crypto key management protocol was developed by Sun Microsystems in ...
11. Firewalls are...
12. Multi-piece screen includes...
13. Shielding transport...
14. War dialers are ...
15. It is not true that the means of combating IP-spoofing is ...
16. To automatically detect potential weaknesses within networks using various tests to test the response to unauthorized intrusions, ...
17. Network analyzers (sniffers) are programs that ...
18. Back Orifice is...
19. An attack in which the attacking computer impersonates a system that the "victim" trusts is called "..."
20. The network attack method, which is a combination of "eavesdropping" and 1P IP spoofing, is called "..."
21. Information security is...
22. S/Key is an authentication protocol based on...
23. The SunScreen device contains ... Ethernet adapters
24. Federal Law No. 139-FZ of July 28, 2012 - additions "on the protection of children" ...
25. Shielding makes it possible to control the information flows directed ...
26. Under the security policy is understood ...
27. Information resources are divided into ...
28. To protect against traffic eavesdropping using a network analyzer, ...
29. When a user logs into a domain by entering their account details, there is...
30. The most common case of violation of the security of an information system is ...
Additional information
Answers to the test Security of Internet resources Synergy MIT / MY (COLLECTION OF TESTS 97 POINTS)
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |