Answers to the test Security of Internet resources Synergy MIT / MY (ANSWER BASE 93/100 POINTS)
1. The IP protocol refers to ...
2. To protect against traffic eavesdropping using a network analyzer, ...
3. The most frequent case of information system security breaches are…
4. To strengthen the security of your wireless network, you should ...
5. It is not true that an IP header is added to the protocol packet ... from the TCP / IP stack
6. The level of technical protection of information is ...
7. The command of the FTP protocol is the command ...
8. Subnet mask 255.255.192.0 includes addresses: ...
9. Traffic between clients and servers on the internal network is best secured with...
10. A set of data that allows you to put a public key with an object that has a corresponding private key is called ...
11. For centralized authentication, you can use ...
12. You can view the ARP table of the host (OC Windows NT) using the command ...
13. The means of technical protection of information include ...
14. The most common case of information system security breach is ...
15. Access control is...
16. It is not true that a characteristic of the UDP protocol is ...
17. To specify the address of the recipient of the message, use the SMTP protocol command ...
18. It is not true that the correct MAC address is...
19. Authorization is the procedure for granting to the subject ...
20. Traffic is...
21. Layers of the TCP / IP protocol stack:
22. The TRACEROUTE command uses protocols ...
23. When establishing a connection using the TCP protocol, the first packet is sent with the flag set ... in the header
24. ... the protocol implements cryptographic protection at the data link layer
25. When a user logs into a domain by entering their account details, there is...
26. It is not true that the TCP connection state is ...
27. Telecommunications means ...
28. First of all, the route is looked up in the routing table ...
29. The network with the address 190.25.32.0 belongs to the class ...
30. Authentication is a verification procedure ...
31. The reaction of the Windows family OS to FIN-scan in the case of a closed port is ...
32. The TELNET service usually uses the port number ...
33. It is not true that the IP protocol includes such a function as ...
34. ICMP protocol refers to the message “…”
35. To send broadcast messages to this network segment, use the address ...
36. The number of routers traversed shows the IP header field of the datagram...
37. A packet transmitted over the TCP protocol is called ...
38. DNS is under attack…
39. Network adapter operating in selective mode ignores frames ...
40. A threat to the data transmission system is ...
41. Network scanners are programs that ...
42. Programs that check large groups of computers on the Internet looking for those vulnerable to a particular type of attack are called ...
43. Computer attacks include ...
44. The basic law in the field of information protection is the Federal Law “...” adopted at the beginning of 1995.
45. The most frequent and most dangerous (in terms of the amount of damage) are ...
46. State information resources are
47. According to statistics, most network attacks are organized from under the operating system ...
48. Information classified as a state secret...
49. A real firewalling system is usually required to "..."
50. The SKIP crypto key management protocol was developed by Sun Microsystems in ...
51. Firewalls are...
52. Multi-component screen includes...
53. Shielding transport...
54. War dialers are ...
55. It is not true that the means of combating IP-spoofing is ...
56. To automatically detect potential weaknesses within networks using various tests to test the response to unauthorized intrusions, ...
57. Network analyzers (sniffers) are programs that ...
58. Back Orifice is...
59. Attack in which the attacking computer pretends to be a C
Answers to the test Security of Internet resources Synergy MIT / MY (ANSWER BASE 93/100 POINTS)
Continuation of questions
60. The network attack method, which is a combination of "eavesdropping" and 1P IP spoofing, is called "..."
61. Information security is ...
62. S/Key is an authentication protocol based on...
63. The SunScreen device contains ... Ethernet adapters
64. Federal Law No. 139-FZ of July 28, 2012 - additions "on the protection of children" ...
65. The main advantages of shielding routers include ...
66. Shielding makes it possible to control information flows directed ...
67. Under the security policy is understood ...
68. Information resources are divided into ...
No feedback yet