№91. Encryption information is…: A) The process of its transformation, in which the content of the information becomes incomprehensible to non-authorized subjects
B) A conversion process in which information is deleted.
C) The process of its transformation, in which the content of information is changed to a false
D) The process of converting information into machine code
E) Identification protocol
F) Software update
G) Super secure
H) Total control Protocol
№92. Software information protection
A) Destroy database
B) uninterrupted power supply unit
C) backup
D) data duplication
E) Desepticons invasion
F) cryptography
G) Trojan virus
H) Delete your data
№93. Ensuring the accuracy and completeness of information and methods of its processing.
A) Damage
B) Confidentiality +
C) Availability
D) Feasibility
E) Dr. Web
F) Integrity
G) Prototype
H) Keyboard
№94. Providing access to information only to authorized users?
A) Prototype
B) integrity
C) Availability
D) Feasibility
E) Dr. Web
F) Damage
G) Privacy
H) Keyboard
№95. The greatest threat to network security pose
A) unauthorized access, electronic eavesdropping and intentional or unintentional damage
B) opening standard user account
C) Opening of the standard account administrator group
D) copying files that have been changed during the day, without a backup mark
E) Main menu
F) Main window
G) Cyber security
H) H. Innovation technology