Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

VI. Укажите буквой правильный перевод

  1. уполномоченный

  1. authorize b. authorized c. unauthorized d. authorizing

  1. уничтожение

  1. destruct b. destructor c. destruction d. destructed

  1. служащий

  1. employee b. employer c. employ d. employment

  1. усиливать

  1. enforcement b. force c. enforce d. enforcing

  1. продолжающийся непрерывно

  1. going on b. gone c. go on d. ongoing

  1. комплектующие

  1. supplied b. supplies c. supplying d. supply

  1. обнаружение

  1. detected b. detective c. detect d. detection

  1. ограниченный

  1. restricted b. restricting c. restrict d. restriction

VII. Укажите буквой правильный ответ на вопрос

  1. What is hacking?

  1. obtaining property

  2. removal of a program

  3. unauthorized access to computer

  4. damage of hardware

  1. What does a disk with a virus do?

  1. damages the working of the computer

  2. protects software from damage

  3. damages the hardware

  4. deletes information from the computer

  1. What is information security?

  1. protecting information from unauthorized access

  2. perusal and inspection of information

  3. protecting equipment of the computer

  4. securing interconnected information

  1. What does a credit card transaction on the Internet require?

  1. log file b. backups c. printed receipt d. number

  1. Who must carry out a risk assessment?

  1. business environment which is constantly changing

  2. team of people who have knowledge of specific areas

  3. human user which is the most vulnerable point

  4. application programmer

  1. In what way can the risk be transferred to another business?

  1. estimating the value

  2. conducting a threat assessment

  3. buying insurance

  4. calculating vulnerability

  1. What must Management do to mitigate a risk?

  1. recognize the value of the information

  2. implement different types of control

  3. deny having received the transaction

  4. establish the sources of information

  1. What is counterfeit?

  1. breach of confidentiality

  2. mechanical damage of the basis

  3. protecting the computers and information

  4. something made in imitation of another thing

VIII. Укажите номер соответствующего русского эквивалента

  1. access 1. брандмауэр

  2. authenticity 2. вносить в журнал

  3. carrier 3. выбирать

  4. channel 4. дисковод

  5. competitor 5. доступ

  6. counterfeit 6. закон

  7. encryption 7. законность

  8. firewall 8. запрещать

  9. hard drive 9. защищать

  10. identify 10.изменять

  11. insurance 11.канал

  12. integrity 12.конкурент

  13. intelligence 13.мера

  14. laptop 14.несанкционированный

  15. law 15.носитель

  16. legality 16.ноутбук

  17. level 17.обеспечивать

  18. log 18.обрабатывать

  19. measure 19.ограничивать

  20. modify 20.определять

  21. password 21.пароль

  22. process 22.подделка

  23. prohibit 23.подлинность

  24. protect 24.разведка

  25. provide 25.разделять

  26. requirement 26.страховка

  27. restrict 27.требование

  28. select 28.уровень

  29. separate 29.уязвимый

  30. unauthorized 30.целостность

  31. value 31.ценность

  32. vulnerable 32.шифрование

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]