Cribs exam Information Security

Affiliates: 0,23 $how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 2 last one 08.12.2008
Refunds: 0

Uploaded: 16.12.2007
Content: 71216170550330.exe 133,8 kB


List of Questions:
1. Define the concept of "information security". Explain the components.
2. What are the objectives of information security. Define components.
3. Define the concept of "security system.
4. List of standards. Provide examples for each group.
5. Define (ISO 15408) concepts: product IT, IT system, the object of evaluation.
6. Types of resources. (Partial response)
7. Give the definition of "material losses". List the components.
8. Define the concept of "loss of communication." List the components.
9. Define the concept of "mental loss." List the components
10. Define the concept of "threat".
11. Give the definition of "threat to privacy."
12. Give the definition of "threat of affordability"
13. Give the definition of "threat to the integrity."
14. Give the definition of "source of threat"
15.Klassifitsirovat sources of threats.
16. Give the definition of "vulnerability".
17. Arrange modalities threats.
18. Forms of implementation of IT threats (list, to clarify the mechanism of realization).
19. Forms of realization of organizational and legal threats (list, to clarify the mechanism of realization)
20. Types of program implementation threats (list, clarify mechanisms of realization).
21. Types of threats to wireless technologies (list, clarify mechanisms of realization).
22. Types implementing Internet threats (list, clarify mechanisms of realization)
23. Define the concept of "malware" ("destructive software tool" (RPM))
24. Types of CPF (draw scheme)
25. Give the definition of "Trojan horse."
26. Define the terms "risk", "risk management".
27. Define the concept of "risk assessment" (OR). List the tasks of risk assessment.
28. Describe two approaches to risk assessment.
29. List the quantitative methods of risk assessment.
30. The main options for risk management.
31.Dat definition of "security policy."
32. The content of the document security policy.
33. The objectives of the security (ISO 15408).
34. The content of legislative measures to ensure information security.
35. The content of administrative measures to ensure information security.
36. The content of procedural measures to ensure information security.
37. Describe the security element "Personnel Management".
38. Describe the security element "Physical security".
39. Expand the concept of "protected area".
40. Expand the concept of "protection equipment".
41. List the mechanisms by which to implement such a security element as the "ability to support the work-IP."
42. Expand the concept of configuration management (ISO 20000).
43. Define the concept of "Ensuring high availability of service."
44. Threats to availability.
45. Measures to ensure reliability (list and explain)
46. \u200b\u200bMeasures to ensure the survivability (list and explain).
47. Define the concept of "replication."
48. Classes replication (list and explain).
49. The choice of replication.
50. Measures to ensure serviceability (list and explain).
51. Define and explain the concept of "clustering".
52. List the tasks of anti-virus security.
53. The content of the functional anti-virus security policy.
54. List the unconventional methods used to protect against destructive software.
55. List and explain the criteria for selection of antiviral agents.
56. List targets in response to violations of information security.
57. Expand the concept of "notification of violations of information security"
58. List and explain the requirements for notification of violations of information security.
59. Explain the treatment response "to defend and conti


No feedback yet.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)