- Arts & Culture 6205
- Business & Economics 676
- Computers 324
- Dictionaries & Encyclopedias 70
- Education & Science 76906
- Abstracts 73
- Astrology 4
- Biology 8
- Chemistry 3979
- Coursework 15556
- Culture 8
- Diplomas 316
- Drawings 1596
- Ecology 5
- Economy 81
- English 80
- Ethics, Aesthetics 3
- For Education Students 17651
- Foreign Languages 11
- Geography 3
- Geology 1
- History 88
- Maps & Atlases 5
- Mathematics 12624
- Musical Literature 2
- Pedagogics 19
- Philosophy 22
- Physics 15120
- Political Science 5
- Practical Work 59
- Psychology 65
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sociology 9
- Summaries, Cribs 87
- Test Answers 160
- Tests 8753
- Textbooks for Colleges and Universities 32
- Theses 7
- To Help Graduate Students 14
- To Help the Entrant 38
- Vetting 382
- Works 13
- Информатика 8
- Engineering 872
- Fiction 708
- House, Family & Entertainment 84
- Law 133
- Website Promotion 70
Database Security (Synergy Answers)
Refunds: 0
Uploaded: 04.05.2020
Content: Безопасность баз данных2.zip 15,91 kB
Product description
Database Security Test Answers Synergy
30 questions - good rating
Information security, according to the legislation of the Russian Federation, is ...
marketing
safety methodological approach
code of practice, compliance with which is designed to protect computers and the network from unauthorized access
the state of protection of the national interests of the Russian Federation in the information sphere, determined by the totality of the balanced interests of the individual, society and the state
the state of security of the information environment of society, ensuring its formation, use and development in the interests of citizens, organizations, the state
It is not true that the kind of database work is ...
data selection
filling the database
database creation
data sorting
data form creation
data search
Arrange the effectiveness of password matching in increasing order.
Answer Type: Sort
1 total enumeration optimized with dictionaries
2 password selection using user knowledge
3 total search, optimized according to the statistics of occurrence of characters
4 total bust
To complicate the selection of the password for the stolen key medium, the ...
sharing key media
integrated identification
duplication of key carrier
External threats to information security of databases include ...
distortions in the transmission channels of information coming from external sources circulating in the system and transmitted to consumers, as well as invalid values and changes in the characteristics of information flows from the external environment and inside the system
errors in determining the conditions and parameters of the functioning of the external environment., in which it is necessary to use an information system and, in particular, software and hardware data protection
system errors in setting goals and tasks of designing automated information systems and their components, made in the formulation of requirements for the functions and characteristics of system security
When designing an information base, it is first necessary to determine ...
key fields
processing and control flow
data structure and relationships
way to interpret reports
Computer simulation is ...
computer-assisted model building process
building a model on a computer screen
the process of researching an object using its computer model
solving a specific problem using a computer
The database is ...
data set collected on one diskette
data intended for the program
a set of interconnected data organized according to certain rules, providing general principles for the description, storage and processing of data
data sent over communication networks
Data security in the information base is provided ...
record lock
caller identification
frequency of information updates
information encryption
The main content of the identification procedure is ... identification
appointment
presenting
presentation and verification
The right of access to information is ...
person or process carrying out unauthorized access to information
violation of established access control rules
set of rules. that regulate the procedure and conditions for the access of the subject to information and its carriers
the ability to access information that does not violate the established rules of access control
set of rules for access to information established by legal documents or by the owner or owner of information
When implementing a defensive strategy for ensuring information security, ... threats are primarily taken into account
all potential
all identified
the most dangerous
The characteristics that make up the multidimensional vector of the information security model should be ...
are independent
pairwise dependent
interdependent
Additional information
It is not true that when constructing authentication procedures, a parameter such as ...
identification knowledge
possession of an identifier
identity modification
A relational database is a database in which ...
elements in the record are ordered, i.e. one element is considered the main, the rest are subordinates
records are arranged in random order
information is organized in the form of rectangular tables
free communication between elements of different levels is accepted
It is not true that the disadvantages of authentication procedures based on biometric characteristics include
lack of reliability
uniqueness of an identifying attribute
probability of a mistake of the second kind (denial of access to an authorized person)
Information in the relational database is presented ...
named blocks
as a list
as a set of rectangular tables
as a collection of files
The panel ... is used to create a button in the database
instruments
components
elements
state
The field is ...
some indicator that characterizes a numerical, textual or other value
table column
table row
set of similar data
When registering a new user in the system, the administrator ...
performs user search
changes user privileges
grants user privileges for a specific role
performs user accounting
Security analysis of architectural decisions and their software implementations in the DBMS should include a study of the problem ...
the presence of viruses
technologies for implementing discretionary, credential and role models of access to system resources
identification and authentication of system entities
search for dangerous programs
Subject identification is ...
the procedure for granting the legal entity the appropriate authority and available system resources
establishing whether the subject is exactly who he declared himself to be
identification of persons or processes that carry out unauthorized access to information
recognition procedure of a subject by its identifier
subject authentication with this identifier
The information base of the relational structure is characterized by ...
compound keys
tabular presentation of data
multi-valued links
uniformity of attributes
When implementing a proactive information security strategy, threats are primarily taken into account ...
the most dangerous
all identified
all potential
A model is ...
initial design of the future object
image of the original with its most important properties
original in miniature
exact copy of the original
It is advisable to assign the maximum password age in the interval ...
10-15 business days
30-60 days
50-100 business days
The main purpose of the authentication procedure is ...
verification of additional identification features
granting the subject certain powers
establishing the validity of the subject
Security policy is formalized to ...
presentation of information in the form most suitable for placement on electronic media
a clear statement of the views of the organization’s management on the nature of threats to the organization’s information security and technology to ensure the security of its information resources
bringing the terminological apparatus in accordance with the requirements of regulatory documents to ensure information security
The threat to the information system is ...
an event that had a negative impact on the information system and led to distortion, destruction, copying, blocking access to information
actions leading to distortion, destruction, copying, blocking access to information
the possibility of influencing the information processed in the system, leading to distortion, destruction, copying, blocking access to information
The information model is ...
compilation of traffic rules
stock list item
Car model
gravity law formula
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |