Вопрос №78
V2
| The main type of software used to prevent data loss and malware infection on a computer system (including real-time network protection software):
| 1
| Firewalls
| 0
| Brand - maureas
| 1
| Anti - viruses
| 0
| Anti - encoders
| 0
| Anti - decoders
| 1
| Anti – malwares
|
Вопрос №79
V2
| When using this type of software, there is an increased likelihood of data loss due to cybercrime
| 1
| Malware
| 0
| Protected
| 1
| Pirated
| 0
| Freeware
| 0
| Shareware
| 1
| Not licensed
| 0
| Licensed
|
Вопрос №80
V2
| What is the generic term for computer programs that can wreak havoc on your devices?
| 1
| Malware
| 0
| Damagedroids
| 0
| Rudebots
| 0
| Dangerware
| 1
| Viruses
| 1
| Pirated
|
Вопрос №81
V2
| From this type of cyber threats, 100% protection with anti-malware software is NOT possible:
| 0
| License updeates
| 1
| Viruses
| 0
| All of the above
| 1
| Spyware
| 1
| Network worms
|
Вопрос №82
V2
| This technologies (methodology) allows users to restore data in case of accidentally deleting it from the local computer
| 0
| Data licensing
| 1
| Storing files on cloud technologies
| 1
| Regular data backup
| 0
| Data archiving technologies
| 0
| Data defragmentation technologies
| 1
| Storing a copy of data on secure removable devices
|
Вопрос №83
V2
| The threats to information security of some Company may come from (commonly):
| 1
| Hackers
| 1
| Users
| 1
| Malwares
| 0
| The kind of architecture style in which the company building is built
| 0
| Servers
| 0
| RFID sensors
| 0
| Licensed firewall software
| 0
| WSN sensors
|
Вопрос №84
V2
| Using the «ipconfig command» in command line (without additional attributes) the user can find out ___ of host
| 0
| Subnet Mask only
| 0
| IP Address only
| 1
| DNS suffix
| 0
| Local Network provider company name
| 1
| Subnet Mask
| 0
| Neither of the above
| 1
| Default Gateway
| 0
| Local Network provider company ip address
|
Вопрос №85
V2
| What type of hardware is usually used in a local networks?
| 0
| IP subnet devices
| 1
| Modems
| 1
| Hub
| 1
| Router
| 0
| Software interconnectors
|
Вопрос №86
V2
| Which of the following network topologies will allow an Internet connection?
| 0
| Car
| 0
| Fast-internet
| 0
| Plane
| 1
| Bus
| 1
| Star
| 1
| Ring
| 0
| Neither of the above
|
Вопрос №87
V2
| Unified identifier defining the location of the host address in the network
| 1
| IPv4 or IPv6 adresses
| 0
| Subnet mask
| 1
| IP address
| 0
| Network Topology Id
| 0
| Network gateway
| 1
| Combination of system network and host addresseses
| 0
| WWW address
|
Вопрос №88
V2
| What the term LAN stands for?
| 1
| Network connection of systems located relatively close to each other
| 1
| Network connection of interacting devices within a building/company (relatively small distance between devices)
| 0
| Local addressing netspace
| 0
| Line area network
| 1
| Local area network
| 0
| Low addressing network
|
Вопрос №89
V2
| As a result of the response to the ping command, you received a message about a large number of lost packets (for example, 100%). It means that ___
| 0
| The requested node has already received all packets earlier
| 0
| User entered the command syntax incorrectly
| 0
| The ping successfully completed its work and provided the required information
| 1
| The requested node is unavailable
| 0
| User entered the command syntax within a wrong time period for a current local system
| 1
| There were problems during establishing a connection (requested system is not responding)
| 1
| Computer which user are pinging is not responding
|
Вопрос №90
V2
| To send messages to all nodes of the network x.167.4.76 (where x – random number from 1 to 255), subnet mask - 255.0.0.0, the following address can be is used (broadcast):
| 0
| 192.0.255.0
| 0
| 0.167.255.255
| 0
| 192.167.255.255
| 1
| 192.255.255.255
| 0
| 148. 255.15.255
| 1
| 148. 255.255.255
| 0
| 12. 255.255.11
| 1
| 12. 255.255.255
|
Вопрос №91
V2
| The response of the operating system to user actions is displayed by ___ and _______.
| 1
| Graphical interfaces / output devices
| 0
| System installers / perepherial devices
| 0
| Software installers / storage devices
| 0
| Network equipment / utilities
| 0
| Firmware software / storage devices
| 1
| Graphical interfaces /perepherial devices
| 1
| Perepherial devices / output devices
|
Вопрос №92
V2
| Which of the following is a part of a common database?
| 1
| Tables
| 1
| Table Records
| 1
| Table Fields
| 0
| Worksheets
| 0
| Logical drives
| 0
| Primary encoded name
| 0
| Table author fields
|
Вопрос №93
V2
| In e-commerce, all activities are carried out through
| 1
| Online stores
| 0
| Online portal administrators
| 0
| Banks
| 1
| Online services
| 0
| Regular shops
| 0
| Postal services
| 0
| Online file transfer services
| 1
| Online banking
|
Вопрос №94
V2
| Which one of the following is NOT a feature of electronic commerce?
| 0
| Goods can be advertised and prices compared
| 1
| There is physical contact between buyer and seller
| 0
| Transactions can be processed quickly
| 0
| Services are available 24 hours a day
| 1
| To complete any transaction, a personal presence of both parties (seller / buyer) representatives at an official meeting is mandatory
| 1
| Security of transactions is achieved through many official offline meetings of buyers with sellers
|
|