Similar items
Life safety 49 questions test
Seller:
alevtina_sar
Rating:
3,2
Sales:
9
price:
0,87 $
IFRS test Synergy
Seller:
alevtina_sar
Rating:
3,2
Sales:
1
price:
3,26 $
History test synergy
Seller:
alevtina_sar
Rating:
3,2
Sales:
8
price:
3,26 $
HR strategy test Synergy
Seller:
alevtina_sar
Rating:
3,2
Sales:
9
price:
2,72 $

Internet resource security - synergy test

Replenishment date:
Sales:
0
Refunds:
0
Reviews:
0
Views:
85
This item has run out. Check back later or try searching other sellers
Seller
Seller:
edurepetitor
Rating:
0,04
Ask a Question
Report a violation
Description
Synergy answers to discipline - Internet resource security
This collection contains 67 answers
Minimum rating from "Good"

1. ... the protocol implements cryptographic protection at the link layer
2. Back Orifice is ...
3.S / Key is an authentication protocol based on
4. Authorization is a procedure for granting a subject ...
5. An attack in which the attacking computer pretends to be a system that the "victim" trusts is called "..."
6. Authentication is a verification procedure ...
7. The basic law in the field of information protection is the Federal Law adopted at the beginning of 1995
8. War dialers are ...
9. First of all, the route is viewed in the routing table ...
10. State information resources are
11. To automatically detect potential weak points within networks using various tests to check the response to unauthorized intrusions, it is used ...
12. To protect against listening to traffic using a network analyzer, you can use ...
13. To send broadcast messages to this network segment, the address is used ...
14. To specify the address of the recipient of the message, use the SMTP protocol command ...
15. For centralized authentication, you can use ...
16. Protection of information is
17. Information resources are divided into ...
18. Information classified as a state secret ...
19. Computer attacks include ...
20. Subnet mask 255.255.192.0 includes addresses: ...
21. The main advantages of shielding routers include
22. The message "..." belongs to the ICMP protocol
23. IP refers to ...
24. The means of technical protection of information include ...
25. When a user LOGS into a domain by entering their account details, it happens ...
26. The number of routers to overcome is shown by the IP datagram header field ...
27. The TRACEROUTE command uses protocols ...
28. The command of the FTP protocol is the command ...
29. Firewalls are
30. The method of network attack, which is a combination of "eavesdropping" and IP spoofing'a .. is called
31. The multi-component screen includes ...
32. DNS is susceptible to attack ...
33. A set of data that allows you to put a public key with an object that has a corresponding private key is called ...
34. The most frequent case of information system security breach is ...
35. It is not true that an IP header is added to the protocol packet ... from the TCP / IP stack
36. It is not true that IP refers to a function such as ...
37. It is not true that the correct MAC address is ...
38. It is not true that the TCP connection state is ...
39. It is not true that the characteristic of UDP is ...
40. It is not true that the means of combating IP-spoofing is ...
41. A real firewalling system is usually required to
42. A packet transmitted over the TCP protocol is called ...
43. According to statistics, most network attacks are organized from under the operating system ...
44. Security policy means ...
45. You can view the ARP table of the host (OC Windows NT) using the command ...
46. ​​When establishing communication via TCP protocol, the first packet is sent with the set flag ... in the header
47. Programs that scan large groups of computers on the Internet in search of vulnerable to a particular type of attack. Are called ...
48. The SKIP cryptokey management protocol was developed by Sun Microsystems in
49. The reaction of Windows operating systems to FIN-scanning in case of a closed port is ...
50. The most frequent and most dangerous (in terms of the amount of damage) are ...
51. Network adapter operating in selective mode ignores frames ...
52. Network analyzers (sniffers) are programs that ...
53. Network scanners are programs that ...
54. The network with the address 190.25.32.0 belongs to the class ...
55. The TELNET service usually uses a port number ...
56. Telecommunications means ...
57. Traffic is ...
Additional Information
58. Traffic between clients and servers on the internal network is best protected by ...
59. The threat to the data transmission system is ...
60. Access control is ...
61. The level of technical protection of information is ...
62. Layers of the TCP / IP protocol stack:
63. The SunScreen device contains ... Ethernet adapters
64. Federal Law No. 139-FZ of July 28, 2012 - additions "on the protection of children" ...
65. To strengthen the security of your wireless network, you should ...
66. Shielding makes it possible to control information flows directed ...
67. Shielding transport ...
Similar items
Life safety 49 questions test
Seller:
alevtina_sar
Rating:
3,2
Sales:
9
price:
0,87 $
IFRS test Synergy
Seller:
alevtina_sar
Rating:
3,2
Sales:
1
price:
3,26 $
History test synergy
Seller:
alevtina_sar
Rating:
3,2
Sales:
8
price:
3,26 $
HR strategy test Synergy
Seller:
alevtina_sar
Rating:
3,2
Sales:
9
price:
2,72 $