Content: Ответы.zip (244.87 KB)
Uploaded: 10.11.2020

Positive responses: 0
Negative responses: 0

Sold: 0
Refunds: 0

$1.46
Engineering and technical information protection. Test with answers Synergy 30 questions 70/100 points

The tasks set within the framework of the national security concept are the priority development of domestic modern information and telecommunication technologies and ...

• improving the information structure
• acceleration of development of new information technologies and their wide distribution
• establishing the necessary balance between the need for free exchange of information and acceptable restrictions on its dissemination

The source of information in case of leakage through technical channels may be ...

• species information
•person
• information processed by technical means of information transmission
• information transmitted through communication channels

Signal attributes describe the parameters of fields and generating signals:

• power, frequency, nature, type (analog, pulse), spectrum width;
• height, width, length
• shape, size, details, tone, color, structure and texture

Frequency of attestation checks for premises of the first and second groups:
• at least once a year
• at least 3 times a year
• at least 2 times a year

The vibration channel protection methods include ...

• examination with stethoscopes
• study of architectural and construction documentation
• masking

Information leakage through technical channels is realized as a result of ...
• eavesdropping on confidential conversations and acoustic signals
• interception of various kinds of fields and signals
• monitoring sources of information
• insufficient organization of information protection

Informativeness is a measure of ... a sign

• volume
• openness
• individuality
• indicative

When screening a room, it is used ...

• fluorine mesh
•aluminium foil
•Sheet steel
• copper mesh

Species traits include:

• smell, palette, shades
• height, width, length
• shape, size, details, tone, color, structure and texture
• frequency, amplitude, spectrum width

The object of protection can be ...

• information processes
•information carriers
• subject

The electromagnetic channel of information leakage occurs due to ...

• side electromagnetic radiation of technical means of information transmission
• spurious emissions of technical means of information transmission
• high-frequency irradiation of technical means of information transmission

Signs of the substance:

• color, spectrum width
• power, frequency, amplitude
• physical and chemical composition, structure and properties

Engineering and technical protection means are subdivided into:

• physical, hardware, software, cryptographic, combined
• physical, software, cryptographic, combined
• physical, hardware, software, combined

Technical means of transferring information are technical means ...

• directly processing information of limited access
• directly processing information
• not processing information of limited access

A feature of speech messages is ...

• virtuality
• documentary
• confidentiality
• integrity

Unmasking signs by the informativeness of signs include ...

• direct (additional features of the object) [information content in the range from 0 to 1]
• nominal (uniquely defining the object) [information content = 1]
• informational and psychological
• indirect (signs that do not directly belong to the object)
• technical
• physical

The main types of attack detection systems ...

• local
• network
• software
• hardware

The most important methods of protecting information from illegal access include ...

• archiving (making backups)
• use of special "electronic keys"
• setting passwords for access to information
• use of anti-virus programs
• encryption

The controlled area is ...

• territory of the object
• the territory of the object where unauthorized persons may stay
• the territory of the object where uncontrolled pres
Organizational and technical measures are measures that impose restrictions on ... the functioning of the protected object

•results
•options
•conditions
Unmasking signs by the time of manifestation of signs include ...
• episodic
• periodic
• long-term
• short-term
• permanent

Acoustic information is ...

• propagation of acoustic waves of various shapes and durations, propagating from the source into the surrounding space
• sound waves
• disturbances of the elastic medium of various shapes and durations, propagating from the source into the surrounding space

Technical information security is information security ...
• using software and hardware
• non-cryptographic methods
• cryptographic methods

The most important methods of protecting information from erroneous user actions is ...
• setting special file attributes
• automatic request to confirm the execution of a command or operation
• file encryption
• providing the ability to undo the last action
• duplication of information carriers

Auxiliary technical means and systems are means ...

• and systems directly involved in the processing of restricted information
• and systems that are not directly involved in the processing of information of limited access to telephone communications, computers

An indicator of information security is ...

• the time it takes to crack information security
• likelihood of preventing a threat
• the time during which a certain level of security is provided
• the likelihood of a threat to information security

The basic diagram of the information transmission system is:

• transmitter - broadcast - receiver
• source of information - communication channel - recipient of information
• human - computer - human

The symptoms of infection are ...

• change of file length and creation date
• decrease in the amount of system memory and free disk space for no apparent reason; periodic screen flickering
• slowdown of programs, freezing and restart

The types of information leakage channels include ...

• subjective
• objective
• technical
• material

The concept of a defense system against information weapons should include ...

• means of counter-attack using information weapons
• procedures for inflicting attacks with information weapons
• mechanisms for protecting users from various types and levels of threats to the national information infrastructure
• signs signaling a possible attack
• procedures for assessing the level and characteristics of an attack against national infrastructure as a whole and individual users

After purchase, you will receive answers to the questions that are indicated in the product description
No feedback yet