Content: Ответы.zip (224.75 KB)
Uploaded: 21.02.2021

Positive responses: 0
Negative responses: 0

Sold: 2
Refunds: 0

$1.47
Information systems tools (answers to the Synergy test)
Score Excellent 92/100

The forms of technological and organizational-staff component of information support include ...
management documentation service
information service
expert and analytical service
information security service

The risks of IP administration include ...
reduction of the timeframes set in the respective plans
insufficient funding for IP development
non-compliance with the security conditions of the IS and the data stored in it
dismissal of administrators and specialists who operate and support IS

Methods for planning the execution of work on the administration of IP include ...
planning with charts
scheduling
proactive planning
planning of main works

The category of administrative personnel includes an administrator ...
system security
on working with users
for working with data
for quality control of the system

System administration functions include ...
user training
resource management
performance control
solving problem situations

The principle according to which less financial resources are spent on the development of a system, provided that high efficiency is obtained, is ...
security
payback
reliability
flexibility

A DBMS is ...
tool for maintaining a dynamic information model of the domain
special software package for centralized database management
information system that includes a set of special methods
person who implements database management

The types of IP audit include audit ...
management processes and IT service structure
technical specifications and design documentation for the creation of IS
data backup systems
IS security systems

The Administrator´s functions to protect data from unauthorized access include ...
development of a scheme for categorizing system objects according to the criterion of access for various users
audit of data processing processes from a security point of view
data integrity control in the information system

The hypertext transport protocol for communication between web servers and web clients is ...
POP3
SMTP
HTTP

... is a Hypertext Transfer Protocol
POP3
SMTP
HTTP

The structure of the technical assignment for the development of IS is regulated by ...
agreement for the creation of an information system
state standard GOST 34.602-89
international standard ISO / IEC 12207

The global information exchange mechanism is ...
WWW
Html
HTTP

The main components of the concept of "information security" include ...
availability
integrity
confidentiality
safety

Administrator´s functions related to ensuring the reliability and safety of data include ...
data recovery after failures and damage
copying and duplicating data
checking and maintaining data integrity
data archiving and backup

From the point of view of administration tasks, there is ... a component of the information system
technological
interface
structural
organizational

Common administration tasks include ...
organization and provision of collective work of users with common data
ensuring the reliability and safety of data
commissioning of an information system
provision and maintenance of customization of the components of the information system for the subject area of ​​the system

The database administrator (DB) is ...
information system that includes a set of special methods
tool for maintaining a dynamic information model of the domain
special software package for centralized database management
person who implements database management

The smallest piece of hypertext that can be downloaded in one go is ...
WWW page
Web page
HTML page
The tasks of the administrator for working with data include ...
organization of data placement
changing and recovering passwords
assigning and changing access rights
scheduling and storing backups

A hypertext document hosted on a server using the WWW is called ...
WWW site
Web page
WWW-page

An integral part of the IP audit system is ...
sudden control
external control
internal control
independent information audit

Reliable IP administration technologies include ...
technical means and special tools for IP administration
organization of control over the functioning of all elements of the IS
logging and auditing of security processes

The modes of operation of an automated control system (ACS) include ... data processing
consistent
asynchronous
batch
parallel

The functional type of information security IS is ... security
mechanical
technological
logical
physical

In accordance with the ISO / IEC 12207 standard, administration functions are included in such an information system software lifecycle process as ...
configuration management
quality assurance
infrastructure creation
maintenance of performance

The tasks of reactive network administration include ...
monitoring network traffic
monitoring of individual network devices
setting and changing the network configuration
elimination of emerging failures

The properties of the network in terms of information system configuration management include ... the network
throughput
compatibility
controllability
modularity

... is the language of hypertext
POP3
SMTP
Html

The functions of the administrator at the design stage of the information system are ...
participation in the creation of typical requests., screen forms, report templates
creation and maintenance of a vocabulary and classification base
creation of a functional model of the system

The network layer sends packets from source to destination ...
using the IP routing table
addressing the bridge
using ARP replies
referring to the name server

A socket is ...
IP address and port number
port of a PC on the network
network number included in the IP address
IP address

One of the indicators of the quality of information is ...
subjectivity
credibility
massiveness
continuity

Campus networks are ...
networks that combine many networks of different departments of the same enterprise within a single building or within the same territory
subnets of department networks
local networks. that do not have access to the global Internet network and function without a dedicated server
the Internet

RIP to determine the best path a message should take ...
uses bandwidth
uses the number of hops
changes for each message
uses administrative distance

The extended ping command is used for ...
setting the Internet headers supported by the network
setting the time frame for returning a ping packet
diagnosing the reasons for the delay or non-return of the ping packet
tracking the passage of the datagram through each router

The problem of excessive broadcast traffic can be solved by using ...
bridge
router
hub
filter
No feedback yet