Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

V. Укажите буквой соответствующий перевод подчёркнутых слов

  1. The computer programs that process the information must also be authorized.

  1. обрабатывают b. процесс c. управление d. обладают

  1. Should one defensive measure fail there are other defensive measures.

  1. должен b. будет c. чтобы d. если

  1. Sound judgment is the key to protecting yourself against these issues.

  1. убеждение b. звук c. правильный d. громкий

  1. He could boot the computer from a floppy disc.

  1. сделать доступным b. загрузить c. дать доступ d. иметь доступ

  1. Every computer must have an administrator who can configure the operating system.

  1. фигурировать b. настраивать c. конфигурация d. формирование

  1. Whenever possible, use offline storage for keys.

a. отключённый от линии b. резервный c. особенный d. отдельный

  1. The ones and zeroes that make up the web session have to be able to find their way to the right place.

  1. содержимое b. собрание c. сессия d. программное средство

  1. Usernames and passwords are slowly being replaced with more sophisticated mechanisms.

  1. помещать b. иметь место c. заменять d. размещать

VI. Укажите буквой правильный перевод

  1. уполномоченный

  1. authorization b. authorized c. authorizing d. unauthorized

  1. защищённый

  1. protection b. protecting c. protected d. protects

  1. способность

  1. ability b. able c. available d. availability

  1. распространение

  1. distribute b. disruption c. distribution d. disrupting

  1. отключить

  1. able b. be able c. disabled d. disable

  1. развитый

  1. developing b. development c. developer d. developed

  1. запутанный

  1. obfuscated b. obfuscate c. obfuscating d. obfuscation

  1. защита

  1. protect b. protecting c. protective d. protected

VII. Укажите буквой правильный ответ на вопрос

  1. What is authentication?

  1. adding new functions to operating systems

  2. rendering information unusable

  3. access to information

  4. the act of verifying the claim of identity

  1. What does information security use cryptography for?

  1. to process information

  2. to threaten the information system

  3. to transform usable information into an unusable form

  4. to replace network communication

  1. What can happen if a bad guy has unrestricted access to your computer?

  1. the computer will be protected

  2. the power will be mitigated

  3. you’ll be on a shared server

  4. it’s not your computer any more

  1. What is logon?

  1. configuring the operating system

  2. registration and entrance into system

  3. upload a harmful program

  4. using additional protective measures

  1. Why should you keep the virus scanner updated?

  1. because virus writers periodically develop new techniques

  2. because the spread of the virus falls off

  3. because few people will be able to detect it

  4. because Microsoft Security website has hundreds of white papers

  1. What do you call the smallest amount of information?

  1. cookies b. ether c. bit d. bug

  1. What for should you use sign-in/sign-out sheets in the server room?

  1. to install malicious software

  2. to track who has been there

  3. to identify yourself to the system

  4. to have more privileges on the network

  1. How do virus scanners work?

  1. by comparing the data on your computer against a collection of virus signatures

  2. by exporting information to a floppy disk

  3. by limiting access to information

  4. by a plastic card with a built-in microprocessor

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]