Engineering and technical information protection. Test with answers Synergy 30 questions 70/100 points
The tasks set within the framework of the national security concept are the priority development of domestic modern information and telecommunication technologies and ...
• improving the information structure
• acceleration of development of new information technologies and their wide distribution
• establishing the necessary balance between the need for free exchange of information and acceptable restrictions on its dissemination
The source of information in case of leakage through technical channels may be ...
• species information
•person
• information processed by technical means of information transmission
• information transmitted through communication channels
Signal attributes describe the parameters of fields and generating signals:
• power, frequency, nature, type (analog, pulse), spectrum width;
• height, width, length
• shape, size, details, tone, color, structure and texture
Frequency of attestation checks for premises of the first and second groups:
• at least once a year
• at least 3 times a year
• at least 2 times a year
The vibration channel protection methods include ...
• examination with stethoscopes
• study of architectural and construction documentation
• masking
Information leakage through technical channels is realized as a result of ...
• eavesdropping on confidential conversations and acoustic signals
• interception of various kinds of fields and signals
• monitoring sources of information
• insufficient organization of information protection
Informativeness is a measure of ... a sign
• volume
• openness
• individuality
• indicative
When screening a room, it is used ...
• fluorine mesh
•aluminium foil
•Sheet steel
• copper mesh
Species traits include:
• smell, palette, shades
• height, width, length
• shape, size, details, tone, color, structure and texture
• frequency, amplitude, spectrum width
The object of protection can be ...
• information processes
•information carriers
• subject
The electromagnetic channel of information leakage occurs due to ...
• side electromagnetic radiation of technical means of information transmission
• spurious emissions of technical means of information transmission
• high-frequency irradiation of technical means of information transmission
Signs of the substance:
• color, spectrum width
• power, frequency, amplitude
• physical and chemical composition, structure and properties
Engineering and technical protection means are subdivided into:
• physical, hardware, software, cryptographic, combined
• physical, software, cryptographic, combined
• physical, hardware, software, combined
Technical means of transferring information are technical means ...
• directly processing information of limited access
• directly processing information
• not processing information of limited access
A feature of speech messages is ...
• virtuality
• documentary
• confidentiality
• integrity
Unmasking signs by the informativeness of signs include ...
• direct (additional features of the object) [information content in the range from 0 to 1]
• nominal (uniquely defining the object) [information content = 1]
• informational and psychological
• indirect (signs that do not directly belong to the object)
• technical
• physical
The main types of attack detection systems ...
• local
• network
• software
• hardware
The most important methods of protecting information from illegal access include ...
• archiving (making backups)
• use of special "electronic keys"
• setting passwords for access to information
• use of anti-virus programs
• encryption
The controlled area is ...
• territory of the object
• the territory of the object where unauthorized persons may stay
• the territory of the object where uncontrolled pres
Organizational and technical measures are measures that impose restrictions on ... the functioning of the protected object
•results
•options
•conditions
Unmasking signs by the time of manifestation of signs include ...
• episodic
• periodic
• long-term
• short-term
• permanent
Acoustic information is ...
• propagation of acoustic waves of various shapes and durations, propagating from the source into the surrounding space
• sound waves
• disturbances of the elastic medium of various shapes and durations, propagating from the source into the surrounding space
Technical information security is information security ...
• using software and hardware
• non-cryptographic methods
• cryptographic methods
The most important methods of protecting information from erroneous user actions is ...
• setting special file attributes
• automatic request to confirm the execution of a command or operation
• file encryption
• providing the ability to undo the last action
• duplication of information carriers
Auxiliary technical means and systems are means ...
• and systems directly involved in the processing of restricted information
• and systems that are not directly involved in the processing of information of limited access to telephone communications, computers
An indicator of information security is ...
• the time it takes to crack information security
• likelihood of preventing a threat
• the time during which a certain level of security is provided
• the likelihood of a threat to information security
The basic diagram of the information transmission system is:
• transmitter - broadcast - receiver
• source of information - communication channel - recipient of information
• human - computer - human
The symptoms of infection are ...
• change of file length and creation date
• decrease in the amount of system memory and free disk space for no apparent reason; periodic screen flickering
• slowdown of programs, freezing and restart
The types of information leakage channels include ...
• subjective
• objective
• technical
• material
The concept of a defense system against information weapons should include ...
• means of counter-attack using information weapons
• procedures for inflicting attacks with information weapons
• mechanisms for protecting users from various types and levels of threats to the national information infrastructure
• signs signaling a possible attack
• procedures for assessing the level and characteristics of an attack against national infrastructure as a whole and individual users
After purchase, you will receive answers to the questions that are indicated in the product description
No feedback yet