Content: Безопасность баз данных2.zip (15.91 KB)
Uploaded: 04.05.2020

Positive responses: 0
Negative responses: 0

Sold: 3
Refunds: 0

$2.38
Database Security Test Answers Synergy
30 questions - good rating
Information security, according to the legislation of the Russian Federation, is ...
marketing
safety methodological approach
code of practice, compliance with which is designed to protect computers and the network from unauthorized access
the state of protection of the national interests of the Russian Federation in the information sphere, determined by the totality of the balanced interests of the individual, society and the state
the state of security of the information environment of society, ensuring its formation, use and development in the interests of citizens, organizations, the state

It is not true that the kind of database work is ...
data selection
filling the database
database creation
data sorting
data form creation
data search

Arrange the effectiveness of password matching in increasing order.
Answer Type: Sort
1 total enumeration optimized with dictionaries
2 password selection using user knowledge
3 total search, optimized according to the statistics of occurrence of characters
4 total bust

To complicate the selection of the password for the stolen key medium, the ...
sharing key media
integrated identification
duplication of key carrier

External threats to information security of databases include ...
distortions in the transmission channels of information coming from external sources circulating in the system and transmitted to consumers, as well as invalid values ​​and changes in the characteristics of information flows from the external environment and inside the system
errors in determining the conditions and parameters of the functioning of the external environment., in which it is necessary to use an information system and, in particular, software and hardware data protection
system errors in setting goals and tasks of designing automated information systems and their components, made in the formulation of requirements for the functions and characteristics of system security

When designing an information base, it is first necessary to determine ...
key fields
processing and control flow
data structure and relationships
way to interpret reports

Computer simulation is ...
computer-assisted model building process
building a model on a computer screen
the process of researching an object using its computer model
solving a specific problem using a computer

The database is ...
data set collected on one diskette
data intended for the program
a set of interconnected data organized according to certain rules, providing general principles for the description, storage and processing of data
data sent over communication networks

Data security in the information base is provided ...
record lock
caller identification
frequency of information updates
information encryption

The main content of the identification procedure is ... identification
appointment
presenting
presentation and verification

The right of access to information is ...
person or process carrying out unauthorized access to information
violation of established access control rules
set of rules. that regulate the procedure and conditions for the access of the subject to information and its carriers
the ability to access information that does not violate the established rules of access control
set of rules for access to information established by legal documents or by the owner or owner of information

When implementing a defensive strategy for ensuring information security, ... threats are primarily taken into account
all potential
all identified
the most dangerous

The characteristics that make up the multidimensional vector of the information security model should be ...
are independent
pairwise dependent
interdependent
It is not true that when constructing authentication procedures, a parameter such as ...
identification knowledge
possession of an identifier
identity modification

A relational database is a database in which ...
elements in the record are ordered, i.e. one element is considered the main, the rest are subordinates
records are arranged in random order
information is organized in the form of rectangular tables
free communication between elements of different levels is accepted

It is not true that the disadvantages of authentication procedures based on biometric characteristics include
lack of reliability
uniqueness of an identifying attribute
probability of a mistake of the second kind (denial of access to an authorized person)

Information in the relational database is presented ...
named blocks
as a list
as a set of rectangular tables
as a collection of files

The panel ... is used to create a button in the database
instruments
components
elements
state

The field is ...
some indicator that characterizes a numerical, textual or other value
table column
table row
set of similar data

When registering a new user in the system, the administrator ...
performs user search
changes user privileges
grants user privileges for a specific role
performs user accounting

Security analysis of architectural decisions and their software implementations in the DBMS should include a study of the problem ...
the presence of viruses
technologies for implementing discretionary, credential and role models of access to system resources
identification and authentication of system entities
search for dangerous programs

Subject identification is ...
the procedure for granting the legal entity the appropriate authority and available system resources
establishing whether the subject is exactly who he declared himself to be
identification of persons or processes that carry out unauthorized access to information
recognition procedure of a subject by its identifier
subject authentication with this identifier

The information base of the relational structure is characterized by ...
compound keys
tabular presentation of data
multi-valued links
uniformity of attributes

When implementing a proactive information security strategy, threats are primarily taken into account ...
the most dangerous
all identified
all potential

A model is ...
initial design of the future object
image of the original with its most important properties
original in miniature
exact copy of the original

It is advisable to assign the maximum password age in the interval ...
10-15 business days
30-60 days
50-100 business days

The main purpose of the authentication procedure is ...
verification of additional identification features
granting the subject certain powers
establishing the validity of the subject

Security policy is formalized to ...
presentation of information in the form most suitable for placement on electronic media
a clear statement of the views of the organization’s management on the nature of threats to the organization’s information security and technology to ensure the security of its information resources
bringing the terminological apparatus in accordance with the requirements of regulatory documents to ensure information security

The threat to the information system is ...
an event that had a negative impact on the information system and led to distortion, destruction, copying, blocking access to information
actions leading to distortion, destruction, copying, blocking access to information
the possibility of influencing the information processed in the system, leading to distortion, destruction, copying, blocking access to information

The information model is ...
compilation of traffic rules
stock list item
Car model
gravity law formula
No feedback yet