Вопрос №174
V2
| Three primary principles of Information security
| 0
| Reliability
| 1
| Confidentiality
| 0
| Accuracy
| 0
| Accessibility
| 0
| Comprehensibility
| 1
| Integrity
| 1
| Availability
| 0
| Versatility
|
Вопрос №175
V2
| Integrity protection protects ... from being altered by unauthorized individuals
| 0
| text
| 1
| data
| 0
| video
| 0
| animation
| 0
| hypertext
| 1
| operating systems
| 1
| applications
| 0
| users
|
Вопрос №176
V2
| Possible attacks that may arise with your computer if not proper security measures taken
| 0
| Open the file or link
| 1
| Harvest and sell email addresses and passwords
| 0
| Data protection
| 0
| Updating OS
| 0
| Works properly and fast
| 1
| Record keystrokes and steal passwords
| 1
| Send spam and phishing emails
| 0
| Automate series of operations
|
Вопрос №177
V2
| The following steps can be followed to prevent being attacked your computer
| 0
| Open any files or links
| 1
| Use good, cryptic passwords
| 0
| Backing up content of HDD
| 0
| Update OS
| 0
| Do not keep your passwords secret
| 1
| Keep your passwords secret
| 1
| Do not click on unknown links or attachments
| 0
| Click on unknown links or attachments
|
Вопрос №178
V2
| What is a computer virus?
| 0
| A harmful computer program developed by a person that helps to perform operations of a computer in various ways
| 1
| A harmful computer program developed by a person that disrupts operations of a computer in various ways
| 0
| All browsers
| 0
| An Operating System
| 0
| A program that do not damage important files such as documents beyond recovery
| 1
| A program that damages important files such as documents beyond recovery
| 1
| A program just simply destroys the files system of computer making it completely unusable
| 0
| A program just simply corrects the files system of computer making it completely usable
|
Вопрос №179
V2
| What do you know about worms (computer virus)?
| 0
| It requires user actions to spread, they need help to move from system to system over networks
| 1
| Do not require user actions to spread, they move from system to system over networks on their own
| 0
| Can not do nasty actions such as creating unnecessary files inside system folders
| 0
| Do not steal information from user’s computers and upload to web sites
| 0
| A program that do not damage important files such as documents beyond recovery
| 1
| Can do nasty actions such as creating unnecessary files inside system folders
| 1
| Steal information from user’s computers and upload to web sites
| 0
| A program just simply corrects the files system of computer making it completely usable
|
Вопрос №180
V2
| Examples of macro viruses
| 0
| Confiker
| 1
| Relax
| 0
| PSWBugbear
| 0
| Lovgate.F
| 0
| Trile.C
| 1
| Melissa.A
| 1
| Bablas
| 0
| Mapson
|
Вопрос №181
V2
| Trojan horse
| 0
| Main software that contains set of procedures and people through which information is processed to deceive users of its true intent
| 1
| Any malicious software that disguises itself in order to deceive users of its true intent
| 0
| They comprihend for about 8 in 10 of all new malware infections
| 0
| They save for about 8 in 10 of all new malware infections
| 0
| They modify for about 8 in 10 of all new malware infections
| 1
| It can take the form of just about anything: an innocuous download link, an email attachment sent from a work colleague or an image sent via social media.
| 1
| They account for about 8 in 10 of all new malware infections
| 0
| They disrupt for about 8 in 10 of all new malware infections
|
Вопрос №182
V2
| Hackers may use your computer …
| 0
| Main software that contains set of procedures and people through which information is processed to deceive users of its true intent
| 1
| to send spam or viruses
| 0
| They comprehend for about 8 in 10 of all new malware infections
| 0
| They save for about 8 in 10 of all new malware infections
| 0
| They modify for about 8 in 10 of all new malware infections
| 1
| host Web site
| 1
| do other activities that cause computer malfunctions
| 0
| They disrupt for about 8 in 10 of all new malware infections
|
Вопрос №183
V2
| Cyber security is aimed … , or others, …
| 0
| to send spam or viruses
| 1
| at preventing cybercriminals
| 0
| comprehend for about 8 in 10 of all new malware infections
| 0
| host Web site
| 0
| do other activities that cause computer malfunctions
| 1
| malicious insiders
| 1
| from accessing, harming, disrupting or modifying IT systems and applications
| 0
| They disrupt for about 8 in 10 of all new malware infections
|
Вопрос №184
V2
| The Internet Protocol is one of the main protocols used at the network layer, along with several other protocols for …
| 0
| sending spam or viruses
| 1
| routing
| 0
| about 8 in 10 of all new malware infections
| 0
| hosting Web site
| 0
| doing other activities that cause computer malfunctions
| 1
| testing
| 1
| encryption
| 0
| disruption
|
Вопрос №185
V2
| WWW is the software which is used ... and it consists of …, which are stored in different computers.
| 0
| to send data
| 1
| to access the information from the Internet
| 0
| to access the digital resources from the Internet
| 0
| to upload the information from the computer
| 0
| to save the information from the Internet
| 1
| files, folders
| 1
| the documents
| 0
| to read the information from the Internet
|
Вопрос №186
V2
| HTML
| 0
| to send data
| 1
| stands for Hyper Text Markup Language
| 0
| stands for Hyper Text Makeup Language
| 0
| stands for Hyper Text Market Language
| 0
| describes the structure of information technologies
| 1
| describes the structure of a Web page
| 1
| allows the documents author to embed hyperlinks
| 0
| allows the user of a computer to embed hyperlinks.
|
Вопрос №187
V2
| Common Internet file extensions include
| 0
| tiff
| 1
| Html or htm, php, asp
| 0
| Ppts, docxt, xlcs
| 0
| Pas, py, bas
| 0
| Obj, bmp
| 1
| Cgi, xml
| 1
| Jpg, gif
| 0
| Kz,ru, eu
|
Вопрос №188
V2
| Search engine system is … which is programmed … and… .
| 0
| Non-automated web-site
| 1
| an automated web-site
| 0
| to save specified keywords
| 0
| to write specified keywords
| 0
| give the web addresses and list of files as a result
| 1
| to search specified keywords
| 1
| give the websites and Internet based documents as a result
| 0
| give the nothing as a result
|
Вопрос №189
V2
| HTTPS …
| 0
| stands for “Hyper Text Transfer Protocol Safety”
| 1
| stands for “Hyper Text Transfer Protocol Secure”
| 0
| Secure means that the data transferred electronically is descripted
| 0
| Secure means that the data transferred electronically is encrypted
| 0
| Secure means that the data transferred electronically is unpacked
| 1
| Secure means that the data transferred electronically is encrypted
| 1
| cannot be accessed by unauthorized people
| 0
| Can be accessed by unauthorized people
|
Вопрос №190
V2
| CSS … and may be used to change …, …
| 0
| stands for Cascading Style Sheat
| 1
| stands for Cascading Style Sheet
| 0
| Location of the website
| 0
| Location of all resources
| 0
| Content of website
| 1
| the type of font
| 1
| size and color
| 0
| Address of the website
|
Вопрос №191
V2
| Email servers …, … , and … messages
| 0
| provide, backup
| 1
| accept, forward
| 0
| save
| 0
| duplicate
| 0
| change
| 1
| deliver
| 1
| store
| 0
| remove
|
Вопрос №192
V2
| The POP3
| 0
| Stands for Pre Office Protocol3
| 1
| Stands for Post Office Protocol3
| 0
| The number ‘3’ is the order number of the protocol in use
| 0
| The number ‘3’ is the location layer of the protocol in OSI model
| 0
| Stands for post official protocol3
| 1
| The number ‘3’ is the version number of the protocol in use
| 1
| have mail accounts (our email IDs).
| 0
| have not mail accounts (our email IDs).
|
Вопрос №193
V2
| An email client is … used to … and … a user's email
| 0
| An information technology
| 1
| a computer program
| 0
| provide
| 0
| write
| 0
| control
| 1
| access
| 1
| manage
| 0
| receive
|
Вопрос №194
V2
| Which of them are included to the core components of a data Centre?
| 0
| An information technology
| 1
| Network infrastructure
| 0
| All data in the library
| 0
| Individual’s personal digital assistant
| 0
| Database of organization
| 1
| Computing resources
| 1
| Storage infrastructure
| 0
| The server of organization
|
Вопрос №195
V2
| Cloud computing is the delivery of computing services such as …,…, … , and more over the Internet
| 0
| An information technology
| 1
| servers, storage
| 0
| All data in the library
| 0
| Individual’s personal digital assistant
| 0
| Resources of organization
| 1
| databases, networking
| 1
| software, analytics
| 0
| The server of organization
|
Вопрос №196
V2
| What you can do with the cloud?
| 0
| Create a new computer
| 1
| Create new apps and services
| 0
| Store, back up and recover data only on your computer’s HDD
| 0
| Read information on illegal sites
| 0
| Create resources for organization
| 1
| Store, back up and recover data
| 1
| Host websites and blogs
| 0
| Remove resources from the server of organization’s library
|
Вопрос №197
V2
| A few of the things you can do with the cloud:
| 0
| Create a new computer
| 1
| Stream audio and video
| 0
| Store, back up and recover data only on your computer’s HDD
| 0
| Read information on illegal sites
| 0
| Create resources for organization
| 1
| Analyse data for patterns and make predictions
| 1
| Deliver software on demand
| 0
| Remove resources from the server of organization’s library
|
Вопрос №198
V2
| Types of cloud services:
| 0
| Processor as a service
| 1
| Platform as a service
| 0
| Plug-in as a service
| 0
| Information as a service
| 0
| Server as a service
| 1
| Infrastructure as a service
| 1
| Software as a service
| 0
| Spam as a service
|
Вопрос №199
V2
| Types of cloud deployments:
| 0
| common
| 1
| public
| 0
| Semi-structured
| 0
| personal
| 0
| individual
| 1
| private
| 1
| hybrid
| 0
| Semi-private
|
Вопрос №200
V2
| What terms are related to the virtualization?
| 0
| Hardware that separates physical infrastructures to develop different dedicated resources
| 1
| Software that separates physical infrastructures to develop different dedicated resources
| 0
| Firmware that separates physical infrastructures to develop different dedicated resources
| 0
| It is the fundamental technology that powers all information resources
| 0
| It is the fundamental technology that helps to the library programs in your organization
| 1
| It is the fundamental technology that powers cloud computing
| 1
| Software of them makes it possible to run multiple operating systems and multiple applications on the same server at the same time
| 0
| Software of them does not make it possible to run multiple operating systems and multiple applications on the same server at the same time
|
Вопрос №201
V2
| With a public cloud, …, … and … is owned and managed by the cloud provider
| 0
| All resources
| 1
| all hardware
| 0
| All Input devices
| 0
| The Central Processing Unit
| 0
| Translators
| 1
| software
| 1
| other supporting infrastructure
| 0
| Library programs
|
Вопрос №202
V2
| Advantages of Software as a service
| 0
| Pay all for what you do not use
| 1
| Pay only for what you use
| 0
| Access app data from a local computer
| 0
| Apply charged client software
| 0
| Use charged client software
| 1
| Use free client software
| 1
| Access app data from anywhere
| 0
| Access app data from organization’s computer
|
Вопрос №203
V2
| Advantages of Infrastructure as a service
| 0
| Lower security
| 1
| Better security
| 0
| No possibility to get new apps to users faster
| 0
| Decrease stability, reliability and supportability
| 0
| Increase non-stability, non-reliability and non-supportability
| 1
| Increase stability, reliability and supportability
| 1
| Gets new apps to users faster
| 0
| Gets new apps to users slower
|
Вопрос №204
V2
| The most famous image editors are
| 1
| Corel DRAW
| 0
| MS Excel
| 0
| MS Access
| 0
| MS Publisher
| 0
| DEV C++
| 1
| Adobe PhotoShop
| 1
| Adobe Illustrator
|
Вопрос №205
V2
| Publishing systems
| 1
| Combine the possibilities of text and graphic editors
| 0
| Allowed to control the size and font of figures
| 0
| For processing only graphic documents
| 0
| Manage and control budgets to ensure maximum value for money
| 0
| Provide information to aid effective panel review of requests
| 1
| For formatting strips with graphic materials and then printed
| 1
| Targeted for use in publishing and typesetting systems
|
Вопрос №206
V2
| The Basic Elements of Multimedia
| 0
| Words
| 0
| Social nets
| 1
| Text
| 1
| Graphics, Animation, Video
| 1
| Audio
| 0
| E-mail
| 0
| Networks
|
Вопрос №207
V2
| Audio is …
| 0
| sequence
| 0
| animation
| 1
| music
| 0
| sentence
| 1
| speech
| 0
| picture
| 1
| other sound
|
Вопрос №208
V2
| Graphics are digital representations of non-text information such as …
| 0
| sequence
| 0
| voice
| 1
| drawings
| 0
| sentence
| 1
| charts
| 0
| sounds
| 1
| pictures
|
Вопрос №209
V2
| The popular file compressions
| 0
| Borland Pascal
| 0
| Dev C++
| 1
| WinRAR
| 0
| Avast
| 1
| WinZIP
| 0
| Windows Explorer
| 1
| 7ZIP
|
Вопрос №210
V2
| Compression formats that used for reduce the file size of images:
| 0
| DOC
| 0
| PPT
| 1
| GIF
| 0
| XLS
| 1
| TIFF
| 0
| MP4
| 1
| GPEG
|
Вопрос №211
V2
| Text was originally defined by printed media such as …
| 0
| films
| 0
| images
| 1
| books
| 0
| animations
| 1
| newspapers
| 0
| podcasts
| |