VI. Tasks for testing on computer security.

1) The forms of information protection include:

a) computer b) insurance c) organizational and technical
d) analytical e) legal

2) In human-computer systems, it is necessary to protect information from three threats:

a) accidental loss or alteration b) intentional misrepresentation
c) authorized viewing d) equipment failures
e) backup

3) List the three most important aspects of information security:

a) Authentication b) Pact c) Integrity

d) adequacy e) confidentiality

4) The three most important goals of information security are protection:

a) representativeness b) accessibility c) relevance

d) integrity e) confidentiality

5) Highlight the three most important methods of protecting information from illegal distribution:

a) setting special file attributes b) encryption c) automatic duplication of files on offline media

d) the use of special “electronic keys”

e) setting passwords for access to information

6) Classical cryptography does not include:

a) all encryption systems before the advent of cryptographic algorithms of the DES family
b) asymmetric encryption systems
c) encryption systems based on a one-time pad
d) symmetric encryption systems

7) Infection with a computer virus can manifest itself in three effects:

a) changing the date and time of file modification b) monitor vibration c) flickering of fluorescent lamps in the room

d) Unexpected messages or images appear on the screen e) Computer slowdown

8) Distinctive features of a computer virus:

a) ease of recognition and destruction

b) a significant amount of program code

c) a small amount of program code

d) the ability to launch independently, copy code multiple times, interfere with computer operation

e) points c) and d)

9) Specify three parameters by which computer viruses can be classified

a) habitat b) mode of contamination of the environment c) scope of the program
d) degree of danger e) degree of usefulness

10) Specify three groups of virus separation depending on the habitat

a) boot b) interface c) network d) registry e) file

11) By habitat, computer viruses are classified into:

a) resident and non-resident b) non-dangerous, dangerous and very dangerous c) parasites, replicators, invisibles, mutants, trojans

d) network, file, boot, macro viruses e) points a) and d)

12) Boot viruses:

a) hit programs at the beginning of their work

b) start when the computer boots

c) always change the beginning and length of the file

d) change the code of the infected file

e) hit boot sectors of disks

13) File viruses:

a) always change the length of the file

b) hit boot sectors of disks

c) always change the beginning of the file

d) always change the code of an infected file

e) always change the beginning and length of the file

14) According to the type of masking, viruses are divided into:

a) self-modifying b) visible
c) conditionally resident d) invisible

15) According to the features of the algorithm, viruses are divided into:

a) resident and non-resident b) watchmen, phages, auditors, vaccines
c) network, file, boot, macro viruses

d) very dangerous, dangerous, not dangerous

e) parasites, replicators, invisibles, mutants, Trojans

16) Network worms are programs that:

a) do not change files on disks, but spread over a computer network, penetrate into the operating system of a computer, find the addresses of other computers or users and send their copies to these addresses

b) modify files on disks and spread within the computer
c) cause failures when the computer is powered from the mains

d) distributed only by e-mail via the Internet

17) Symptoms of infection are:

a) decrease in system memory and free disk space for no apparent reason
b) periodical flickering of the screen c) change in file length and creation date
d) program slowdown, freezing and overloading

18) The main actions (phases) performed by a computer virus:

a) infection b) blocking programs c) manifestation
d) reproduction e) disguise

19) Antivirus programs do not include:

a) interpreters b) phages c) auditors d) watchman e) vaccines

20) Purpose of anti-virus programs of detectors:

a) detection and destruction of viruses b) detection of viruses

c) treatment of infected files d) destruction of infected files

e) control of the spread of viruses

21) The disadvantages of anti-virus tools include:

a) the impossibility of treating “suspicious” objects

b) a variety of settings
c) automatic check of all opened files

d) the need for constant updating of virus databases

22) The antivirus package is:

a) Kaspersky Anti-Virus b) Norton AntiVirus
c) Symantec AntiVirus d) Microsoft AntiVirus

23) The required minimum means of protection against viruses includes:

a) certification of the premises b) output control c) input control
d) archiving e) prevention

24) Cryptographic transformation of information is:

a) introduction of a password system b) data encryption

c) limiting access to information d) backing up information

25) The most effective means to protect against network attacks:

a) use of firewalls, or FireWall

b) visiting only reliable Internet sites

c) use of anti-virus programs
d) use only certified browsers when accessing the Internet

26) FireWall is:

a) a mail program b) the same as an Internet browser
c) same as firewall d) graphical editor

27) Logging user actions allows you to:

a) ensure confidentiality b) manage access to information
c) reconstruct events in the event of a threat to information security d) restore lost information

28) Network audit includes:

a) anti-virus network scan b) selective audit of users

c) security audit of each new system during its installation in the network d) logging of actions of all users in the network

29) Secure Sockets Layer:

a) does not use data encryption

b) ensures secure data transfer
c) cannot use public key encryption
d) this is not a protocol, a program

Be First to Comment

Leave a Reply

Your email address will not be published.