×èòàéòå òàêæå:
|
|
1. What is authentication?
a. adding new functions to operating systems
b. rendering information unusable
c. access to information
d. the act of verifying the claim of identity
2. What does information security use cryptography for?
a. to process information
b. to threaten the information system
c. to transform usable information into an unusable form
d. to replace network communication
3. What can happen if a bad guy has unrestricted access to your computer?
a. the computer will be protected
b. the power will be mitigated
c. you’ll be on a shared server
d. it’s not your computer any more
4. What is logon?
a. configuring the operating system
b. registration and entrance into system
c. upload a harmful program
d. using additional protective measures
5. Why should you keep the virus scanner updated?
a. because virus writers periodically develop new techniques
b. because the spread of the virus falls off
c. because few people will be able to detect it
d. because Microsoft Security website has hundreds of white papers
6. What do you call the smallest amount of information?
a. cookies b. ether c. bit d. bug
7. What for should you use sign-in/sign-out sheets in the server room?
a. to install malicious software
b. to track who has been there
c. to identify yourself to the system
d. to have more privileges on the network
8. How do virus scanners work?
a. by comparing the data on your computer against a collection of virus signatures
b. by exporting information to a floppy disk
c. by limiting access to information
d. by a plastic card with a built-in microprocessor
VIII. Óêàæèòå íîìåð ñîîòâåòñòâóþùåãî ðóññêîãî ýêâèâàëåíòà
1. accidental 1. áëóæäàíèå â èíòåðíåòå
2. authentication 2. áðàíäìàóýð
3. authorized 3. âìåøèâàòüñÿ
4. bogus 4. ãàðàíòèÿ
5. compare 5. äåéñòâèòåëüíûé
6. configure 6. äèñêåòà
7. destination 7. çàïóòûâàòü
8. download 8. çàðåãèñòðèðîâàííûé
9. encrypted 9. çàøèôðîâàííûé
10. firewall 10. çëîíàìåðåííûé
11. floppy disc 11. èçìåðÿòü
12. gauge 12. êîíå÷íàÿ öåëü
13. grant 13. êîíôèäåíöèàëüíîñòü
14. layering 14. ìàðøðóòèçàòîð
15. logon 15. íàñëîåíèå
16. maintenance 16. íàñòðàèâàòü
17. malicious 17. îòêëþ÷àòü
18. mitigate 18. ïðåäîñòàâëÿòü
19. notification 19. ðàçðåøåíèå
20. obfuscate 20. ðåãèñòðàöèÿ
21. permission 21. ñâåðÿòü
22. privacy 22. ñåò÷àòêà
23. retina 23. ñèãíàòóðà
24. router 24. ñêà÷èâàòü
25. signature 25. ñëó÷àéíûé
26. surfing 26. ñðàâíèâàòü
27. tamper 27. òåõíè÷åñêîå îáñëóæèâàíèå
28. unplug 28. óâåäîìëåíèå
29. valid 29. óìåíüøàòü
30. verify 30. óñòàíîâëåíèå ïîäëèííîñòè
31. vulnerable 31. óÿçâèìûé
32. warranty 32. ôèêòèâíûé
Keys (TEST 1)
I.
1 – c
2 – c
3 – a
4 – b
5 – a
6 – d
7 – b
8 – a
II.
1 – e
2 – b
3 – p
4 – h
5 – c
6 – f
7 – d
8 – k
9 – a
10 – n
11 – j
12 – l
13 – i
14 – m
15 – o
16 – g
III.
1 – d
2 – a
3 – b
4 – c
5 – b
6 – d
7 – a
8 – c
IV.
1 – b
2 – c
3 – a
4 – b
5 – a
6 – d
7 – d
8 – c
V.
1 – b
2 – c
3 – a
4 – b
5 – d
6 – a
7 – c
8 – d
VI.
1 – b
2 – c
3 – a
4 – c
5 – d
6 – b
7 – d
8 – a
VII.
1 – c
2 – a
3 – a
4 – d
5 – b
6 – c
7 – b
8 – d
VIII.
1 – 5
2 – 23
3 – 15
4 – 11
5 – 12
6 – 22
7 – 32
8 – 1
9 – 4
10 – 20
11 – 26
12 – 30
13 – 24
14 – 16
15 – 6
16 – 7
17 – 28
18 – 2
19 – 13
20 – 10
21 – 21
22 – 18
23 – 8
24 – 9
25 – 17
26 – 27
27 – 19
28 – 3
29 – 25
30 – 14
31 – 31
32 – 29
Keys (TEST 2)
I.
1 – d
2 – b
3 – a
4 – a
5 – c
6 – d
7 – b
8 – c
II.
1 – p
2 – g
3 – h
4 – e
5 – u
6 – n
7 – j
8 – k
9 – c
10 – w
11 – l
12 – d
13 – i
14 – r
15 – s
16 – o
17 – q
18 – a
19 – f
20 – m
21 – t
22 – b
23 – v
III.
1 – c
2 – b
3 – d
4 – b
5 – a
6 – c
7 – d
8 – a
IV.
1 – b
2 – d
3 – a
4 – a
5 – c
6 – b
7 – d
8 – b
V.
1 – a
2 – d
3 – c
4 – b
5 – b
6 – d
7 – a
8 – c
VI.
1 – b
2 – c
3 – a
4 – c
5 – d
6 – d
7 – a
8 – b
VII.
1 – d
2 – c
3 – d
4 – b
5 – a
6 – c
7 – b
8 – a
VIII.
1 – 25
2 – 30
3 – 8
4 – 32
5 – 26
6 – 16
7 – 12
8 – 24
9 – 9
10 – 2
11 – 6
12 – 11
13 – 18
14 – 15
15 – 20
16 – 27
17 – 10
18 – 29
19 – 28
20 – 7
21 – 19
22 – 13
23 – 22
24 – 14
25 – 23
26 – 1
27 – 3
28 – 17
29 – 5
30 – 21
31 – 31
32 – 4
CONTENTS
UNIT 1 – COMPUTER CRIME……………………………………………………..1
UNIT 2 – TECHNICAL AND LEGAL PROTECTION OF INFORMATION……….4
UNIT 3 – INFORMATION SECURITY………………………………………….....8
UNIT 4 – BASIC PRINCIPLES…………………………………………………….12
UNIT 5 – AUTHENTICITY, NON-REPUDIATION, RISK MANAGEMENT…. 16
UNIT 6 – INFORMATION SECURITY MANAGEMENT……………………… 20
UNIT 7 – CONTROLS……………………………………………………………. 23
UNIT 8 – SECURITY CLASSIFICATION FOR INFORMATION……………… 27
UNIT 9 – ACCESS CONTROL…………………………………………………… 29
UNIT 10 – AUTHORIZATION…………………………………………………… 33
UNIT 11 – CRIPTOGRAPHY…………………………………………………….. 36
UNIT 12 – 10 IMMUTABLE LAWS OF SECURITY, LAWS 1, 2……………….41
UNIT 13 – LAWS 3, 4……………………………………………………………..44
UNIT 14 – LAWS 5, 6……………………………………………………………..47
UNIT 15 – LAWS 7, 8……………………………………………………………..51
UNIT 16 – LAWS 9, 10…………………………………………………………….55
TEST 1 (units 1 – 8)………………………………………………………………..59
TEST 2 (units 9 – 16)……………………………………………………………....63
KEYS………………………………………………………………………………...67
Ñóááîòèíà Ãàëèíà Íèêîëàåâíà, äîö. êàô. àíãë, ôèëîëîãèè, Ìîð. ãîñ. óí-ò, 2012 ã.
Äàòà äîáàâëåíèÿ: 2015-09-10; ïðîñìîòðîâ: 36 | Ïîìîæåì íàïèñàòü âàøó ðàáîòó | Íàðóøåíèå àâòîðñêèõ ïðàâ |