Вопросы по дисциплине:
Программные и аппаратные средства информационной безопасности
Сбросить фильтр
№ | Вопрос | Действия |
---|---|---|
141 | All Of the following are examples Of real security and privacy threats except … | Открыть |
142 | … is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing | Открыть |
143 | … monitors user activity on internet and transmit that information in the background to someone else | Открыть |
144 | Firewall is a type of … | Открыть |
145 | Which of the following is an internal threat to a computer or a computer network … | Открыть |
146 | Passwords are used to improve the … | Открыть |
147 | By security in e-Commerce we mean … | Открыть |
148 | To set a secure password you need to … | Открыть |
149 | … is not an examples of cyber attacks | Открыть |
150 | To prevent cyber-attack in your organization you need to … | Открыть |