Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

II. Укажите буквами пары синонимов

  1. access a. alter

  2. auditing b. checking

  3. breach c. corrupt

  4. conceal d. data

  5. destroy e. entry

  6. hardware f. equipment

  7. information g. fight

  8. mitigate h . hide

  9. modify i. limit

  10. powerful j. not allow

  11. prohibit k. reduce

  12. protect l. safeguard

  13. restrict m. secure

  14. safe n. strong

  15. small o. subtle

  16. struggle p. violation

III. Укажите буквой понятия, близкие по значению

  1. gaining unauthorized access to computer

  1. availability b. robbery c. obtaining d. hacking

  1. possibility of being used, being obtained

  1. availability b. confidentiality c. integrity d. authenticity

  1. some secret letters of figures allowing a person to have access to a computer

  1. control b. password c. crossword d. log

  1. special equipment designed to protect computer system from unauthorized access

  1. cipher b. monitor c. firewall d. label

  1. information to be kept secret

  1. available b. confidential c. official d. authorized

  1. programs and information recorded on magnetic carrier of the computer

  1. counterfeit b. firewall c. framework d. software

  1. collecting and studying important information, news which can be useful in war

  1. intelligence b. protection c. integrity d. prevention

  1. reduce, make less serious, dangerous or harmful

  1. estimate b. violate c. mitigate d. validate

IV. Укажите буквой соответствующий английский эквивалент

  1. степень защиты

  1. deserves protection

  2. degree of protection

  3. protection of property

  4. detect protection

  1. промышленный шпионаж

  1. authorized espionage

  2. intelligence

  3. industrial espionage

  4. governmental alteration

  1. обработка данных

  1. data processing

  2. auditing of information

  3. impact of information

  4. data upgrading

  1. отключение энергии

  1. impact of supply

  2. power outage

  3. utility of power

  4. failure of operation

  1. непрерывный процесс

  1. ongoing process

  2. beyond the process

  3. ongoing income

  4. discernible impact

  1. злонамеренные действия

  1. vulnerable incidents

  2. discernible actions

  3. intentional acts

  4. malicious acts

  1. снизить риск

  1. overlook the failure

  2. blatant risk

  3. influence the risk

  4. mitigate the risk

  1. ограниченный доступ

  1. recent access

  2. restricted assets

  3. restricted access

  4. obsolete access

V. Укажите буквой соответствующий перевод подчёркнутых слов

  1. Modification is defined as removal of any program or data on a computer

  1. цифра b. сведения c. число d. дата

  1. The level of security of information is determined by a block of its features.

  1. будущее b. числа c. особенности d. масштаб

  1. Should confidential information fall into the hands of a competitor, it could lead to lost business.

  1. если b. следует c. должна d. будет

  1. If unauthorized party obtains the card number, a breach of confidentiality has occurred.

  1. число b. номер c. цифра d. количество

  1. It is necessary to ensure that the data and transactions are genuine.

  1. обязательные b. гениальные c. вероятные d. настоящие

  1. Executive Management can choose to accept the risk based upon the relative low value of the asset.

  1. актив b. доступ c. влияние d. вред

  1. Physical controls monitor and control the environment of the work place and computing facilities.

  1. контролируют

  2. средства оснащения

  3. средства управления

  4. управляют

  1. Laws and other regulatory requirements are also important considerations.

  1. правильный b. регулярный c. режимный d. регулирующий

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]