Security of networks and data transmission channels - Answers 73 points
The most frequent case of information system security breach is ...
• offended employees
•computer viruses
• attacks from outside
• staff errors
A packet with the set flag ... in the header is sent first when establishing communication via TCP
• SYN
• ACK
• FYN
For centralized authentication, you can use ...
• RADIUS
• CONNECT
• RETAIL
Cryptographic protection at the link level is implemented by the ...
• PPTP
• SSL
• TCP
• SSH
Traffic is ...
• data transmission channel
• the amount of information transmitted over the data transmission channel
• a set of messages transmitted over the telecommunication network
A network adapter operating in selective mode ignores ...
• only frames that do not contain the address of this node in the "Recipient address" field
• frames that do not contain the address of this node in the "Destination address" field, as well as broadcast frames
• exclusively broadcast frames
Address ... is used to send broadcast messages on this network segment
• 255.255.255.255
• 192.32.64.255
• 255.255.255.
• 0 0.0.0.0
Telecommunications means ...
• wired, fiber-optic and wireless connection of objects
• a set of communication facilities providing data transfer between computers and information systems that are distant from each other at considerable distances;
• complex of technical means of information transmission
If the subnet mask is 255.255.192.0, then the addresses belong to one subnet ...
• 193.29.179.40, 193.29.179.81, 193.29.92.64 and 193.29.179.22
• 193.29.179.40 and 193.29.92.64
• 193.29.179.40 and 193.29.179.22
• 193.29.179.40 and 193.29.179.81
It is not true that ... is a characteristic of UDP
• work without connection establishment
• presence in the header of the "checksum" field
• floating window technique
When a user logs into a domain by entering their account details, it happens ...
• identification
• terminalization
• authentication
A threat to a data transmission system is ...
• information disclosure and service interruption
• theft, deletion or loss of information and / or other resources
• danger of distortion or modification of information
• danger consisting in the destruction of information or other resources
Authorization is a procedure for granting a subject ...
• providing the subject with certain powers and resources in this system of a certain identifier
• providing the subject with a certain key pair
The SMTP protocol command, which is used to specify the address of the recipient of the message, - ...
• HELO
• RCPT TO
• POST S
• END
The ... command is an FTP command
• DIR
• LS
• RNTO
• GET
Access control is ...
• protection of personnel and resources
• response to attempts of unauthorized access
• a way to protect information by regulating the use of resources (documents, hardware and software, database elements)
The means of technical protection of information include ...
• technical means designed to prevent information leakage through one or more technical channels
• hardware and software protection
• firewalls
Protocols ... are used by the TRACEROUTE command
• ICMP
• ICMP and UDP
• ARP and ICMP
Traffic between clients and servers on the internal network is best protected by ...
• SAP
• SSL
• TPC
Authentication is a verification procedure ...
• user by his identifier
• the authenticity of the claimed user, process or device
• user by name
The level of technical protection of information is ...
• degree of technical protection
• process of technical protection of information
• a set of methods and means of technical protection of information corresponding to the standardized indicators
The ICMP protocol includes the message ...
• Transfer complete
• Network unreachable
• PORT command successful
• RCVD WILL STATUS
S / Key is an authentication protocol based on ...
• PI
It is not true that ... is the state of the TCP connection
• LISTEN
• LAST-ACK
• WAIT
• SYN-SENT
The network with the address 190.25.32.0 belongs to the class ...
• D
• C
• B
•AND
To strengthen the security of your wireless network, you should ...
• use encryption with unique keys
• change the factory SSID
• protect SSNP protocol
First of all, routes like "..."
• route to the network
• routing
• route to the node
• default route
To protect against listening to traffic using a network analyzer, you can use ...
• traffic filtering
• additional authentication
• encryption of transmitted information
Using the ... command in Windows NT, you can view the ARP table of the host
• arp -a
• arp -d
• nbtstat -a
• netstat -d
It is incorrect that an IP header is added to the protocol packet ... from the TCP / IP stack
• DHCP
• ICMP
• ARP
After purchase, you will receive answers to the questions that are indicated in the product description
No feedback yet