Content: Тест с ответами Аудит информационной безопасности Синергия.zip (317.41 KB)
Uploaded: 20.09.2021

Positive responses: 0
Negative responses: 0

Sold: 1
Refunds: 0

$2.57
Information security audit test with answers Synergy
92 questions with answers Result 77 points Good
1. The negative factors affecting the protection system against unauthorized access include ...
2. An operating system of a digital computing system designed for:
3. Information that cannot constitute an official or commercial secret is determined ...
4. Information can be protected from ...
5. Authorized access to information is ...
6. The user, (consumer) of information is ...
7. It is not true that security services used in distributed systems and networks include ...
8. It is not true what the antivirus module refers to ...
9. Installing the licensed software is ...
10. An attack is ...
11. A distinctive feature of computer viruses in comparison with other malicious software is their ability to ...
12. Computers may have local security policy applied ...
13. The European ITSEC safety criteria establish ... safety classes
14. One of the main means of penetration of viruses into a computer
15. Information security, according to the legislation of the Russian Federation, is
16. It is not true that information protection by built-in methods of application programs can be carried out in the direction of ...
17. Means of protection against unauthorized access to information, considered in the "Concept of protection of SVT and AS from unauthorized access to information" as the main ones, are ...
18. Integrity of information means ...
19. It is not true that the sources of information security threats include ...
20. The physical security of an information system means ...
21. The policy of access to information is ...
22. Risk analysis includes ...
23. It is not true that the main types of intrusion detection systems are ... systems
24. Hardware, software and technology to guarantee absolute reliability and security of data in computer systems ...
25. Keylogger programs are used to ...
26. Software that should not be available in the normal operation of the user - ...
27. In terms of legislation (law), there is a level of access to information ...
28. The information security system is ...
29. ... can be attributed to the technical measures of computer security
30. In the standard security policy, the installation of software products directly by the user of a corporate workstation ...
31. The elements that make up the European ITSEC criteria for information security include ...
32. It is not true that ... is referred to as biometric data
33. Access is ...
34. The right of access to information is ...
35. An attacker attacking a corporate telephone exchange may, as a primary target, seek to
36. Virus programs are usually divided according to ...
37. The types of information with limited access include ...
38. The availability of information means ...
39. ... can be attributed to organizational measures of computer security
40. The types of information with limited access include ...
41. The safety communication manager is ...
42. The activity on certification of encryption means on the territory of the Russian Federation is carried out by ... the Russian Federation
43. Antivirus software is ...
44. Violation of the conditions stipulated by the license to carry out activities in the field of information protection (except for information constituting a state secret)
45. When using data compression algorithms ...
46. ​​The network perimeter is ...
47. The technical measures of computer security include ...
48. It is not true that the main objectives of an information security audit include ...
49. The main types of malicious impact on the system include ...
50. Subject authentication is ...
51. Information security audit is ...
52. Information Security Product Certificate, ...
53. Legal measures of computer security include
54. The directions in which information protection is carried out by built-in methods of applied programs is ...
55. Arrange the stages of an information security audit in their logical order: 56. Confidentiality of information means ...
57. Virus programs are usually divided according to ...
58. Antivirus programs include ...
59. It is not true that the types of malicious software include ...
60. Subject authorization is ...
61. Virus programs are usually divided according to ...
62. The on-site safety manager is ...
63. The system software includes:
64. Attacks based on methods of social engineering include ...
65. The security service used in distributed systems and networks is ...
66. According to the installation method, such software protection systems (SW) are distinguished as
67. Subject identification is ...
68. Distinguishing ability of computer viruses from malicious
69. The modern computer organization was proposed by:
70. ... - a tracking device placed on the user´s computer without his consent, control and notification
71. Organizational measures of computer security include ...
72. Unauthorized access to information is ...
73. In accordance with the legislation, responsibility for illegal restriction of access to information and for violation of the information protection regime is borne by ...
74. According to the existing rules, only an enterprise that has ...
75. When using data encryption algorithms ...
76. The internal network is ...
77. The main types of intrusion detection systems include ...
78. Utilities of hidden control allow ...
79. The European ITSEC criteria for information security include ...
80. Local security of an information system means ...
81. Protection of information by embedded methods of application programs can
is carried out in the direction of ...
82. Utilities of hidden management allow ...
83. The main meaning of differentiation of user access rights -
84. ... can be attributed to legal measures of computer security
85. Information is ...
86. The IT systems security manager is ...
87. Local security policies are applied on computers ...
88. When using mutation algorithms
89. Criminal activity, which involves the use of methods of manipulating the user aimed at obtaining confidential data. - this is...
90. The main types of intrusion detection systems include ... systems
91. Programs - ... belong to antivirus programs
92. Utilities of hidden management allow ...

Topic 1. Information security audit, basic concepts, definitions, stages, types and areas of activity
Topic 2. Legal aspects of information security audit
Topic H. Practical audit of information security of organizations and systems
No feedback yet