- Arts & Culture 7129
- Books in Foreign Languages 152
- Business & Economics 4394
- Computers 2143
- Dictionaries & Encyclopedias 596
- Education & Science 114843
- Abstracts 1119
- Astrology 12
- Astronomy 14
- Biology 33
- Chemistry 5891
- Coursework 14557
- Culture 26
- Diplomas 2358
- Drawings 1184
- Ecology 28
- Economy 317
- English 988
- Entomology 2
- Ethics, Aesthetics 21
- For Education Students 31453
- Foreign Languages 54
- Geography 19
- Geology 17
- History 263
- Maps & Atlases 37
- Mathematics 16222
- Musical Literature 7
- Pedagogics 202
- Philosophy 171
- Physics 16170
- Political Science 120
- Practical Work 171
- Psychology 462
- Religion 49
- Russian and culture of speech 55
- School Textbooks 67
- Sexology 67
- Sociology 43
- Summaries, Cribs 682
- Test Answers 57
- Tests 20589
- Textbooks for Colleges and Universities 525
- Theses 208
- To Help Graduate Students 22
- To Help the Entrant 97
- Vetting 395
- Works 50
- Информатика 19
- Engineering 3384
- Esoteric 930
- Fiction 3240
- For Children 328
- House, Family & Entertainment 2301
- Law 2682
- Medicine 1211
- Newspapers & Magazines 386
- Security 253
- Sport, Tourism 1009
- Website Promotion 631
Security of client operating systems Synergy
Uploaded: 06.09.2022
Content: Ответы Безопасность клиентских операционных систем Синергия.pdf 285,3 kB
Product description
Client operating system security answers to Synergy tests - score 73/100 points
1. Installing the licensed software is ...
2. Authorized access to information is ...
3. Information security, according to the legislation of the Russian Federation, is ...
4. The information sphere is ...
5. Subject Authentication is ...
6. It is not true that the sources of threats to information security include ...
7. The legal measures of computer security include ...
8. The organizational measures of computer security include ...
9. Information Security Product Certificate ...
10. The legal measures of computer security include ...
11. The policy of access to information is ...
12. The technical measures of computer security include ...
13. In the standard security policy, the installation of software products directly by the user of a corporate workstation ...
14. Confidentiality of information means ...
15. It is not true what types of malicious software are ...
16. It is not true that the main objectives of IS audit include ...
17. Arrange the stages of an information security audit in their logical order:
18. ... - a tracking tool placed on the user´s computer without his consent, control and notification
19. The main point of differentiating user access rights is ...
20. Risk analysis includes ...
21. Software that should not be available in the normal operation of the user - ...
22. Violation of the conditions stipulated by the license to carry out activities in the field of information protection (with the exception of information constituting a state secret) ...
23. Local security of an information system means ...
24. The information security system is ...
25. Subject identification is ...
26. The technical measures of computer security include ...
27. Subject authorization is ...
28. The security service used in distributed systems and networks is ...
29. The organizational measures of computer security include ...
30. Distinguishing ability of computer viruses from malicious
31. From the point of view of legislation (law), there is a level of access to information that ...
32. The system software includes:
33. It is not true that biometric data refers to ...
34. The operating system of a digital computing system designed to provide:
35. The main types of malicious impact on the system include ...
36. Information is ...
37. Hardware, software and technology can guarantee absolute reliability and security of data in computer systems ...
38. Information that cannot constitute an official or commercial secret is determined ...
39. Virus programs are usually divided by ...
40. Antivirus programs are distinguished by types ...
41. The directions in which information is protected by embedded methods of applied programs include ...
42. The European ITSEC safety criteria establish ... safety classes
43. The main types of intrusion detection systems include ...
44. The availability of information means ...
45. Virus programs are usually divided by ...
46. In accordance with the legislation, responsibility for illegal restriction of access to information and for violation of the information protection regime is borne by ...
47. According to the existing rules, only an enterprise that has ...
48. Unauthorized access to information is ...
49. Certification of encryption tools in the Russian Federation is carried out by ...
50. The modern computer organization was proposed by:
51. In the "Concept of protection of SVT and AS from unauthorized access to information" as the main means of protection against unauthorized access to information are considered ...
52. It is not true that the anti-virus modules include ...
53. The main means of penetration of viruses into the computer ...
54. The physical security of an information system means ...
55. Local security policies are applied on computers ...
Additional information
56. The European ITSEC criteria for information security include ...
57. The types of information with limited access include ...
58. Utilities of hidden management allow ...
59. The European ITSEC criteria for information security include ...
60. The user, (consumer) of information is ...
61. The right of access to information is ...
62. Integrity of information means ...
63. Information can be protected from ...
64. The types of information with limited access include ...
65. Utilities of hidden management allow ...
After purchase, you will receive answers to the questions that are indicated in the product description