29. Xesh funktsiya to’g’ri ko’rsatilgan javobni aniqlang.
MD5
SHM1
RSA
DES
30. MD5, SHA1, Tiger xesh funktsiyalari uchun blok uzunligi necha baytga teng?
64 bayt
32 bayt
128 bayt
16 bayt
31. Sub’ektni ob’ektga ishlash qobilyatini aniqlash – nima?
Foydalanishni boshqarish
Ruxsatlarni boshqarish
Ruxsatlar va sub’ektlarni boshqarish
Ruxsatlar va foyddalanishni boshqarish
32. Foydalanishni boshqarishda sub’ekt bu - ....
Inson, dastur, jarayon
Jarayon, dastur
Ma’lumot, resurs, jarayon
resurs
33. Foydalanishni boshqarishning qaysi usuli tizimdagi shaxsiy ob’ektlarni ximoyalash uchun qo’llaniladi?
Discretionary access control DAC
Mandatory access control MAC
Role-based access control RBAC
Attribute based access control ABAC
34. Foydalanishni boshqarishning qaysi usulidan asosan operatsion tizimlarda qo’llaniladi?
Discretionary access control DAC
Mandatory access control MAC
Role-based access control RBAC
Attribute based access control ABAC
35. Foydalanishni boshqarishning qaysi usulida foydalanishlar sub’ektlar va ob’ektlarni klassifikatsiyalashga asosan boshqariladi?
Mandatory access control MAC
Discretionary access control DAC
Role-based access control RBAC
Attribute based access control ABAC
36. Foydalanishni boshqarishning qaysi usulida xavfsizlik markazlashgan tarzda xavfsizlik siyosati m’muri tomonidan amalga oshiriladi?
Mandatory access control MAC
Discretionary access control DAC
Role-based access control RBAC
Attribute based access control ABAC
37. Foydalanishni boshqarishning qaysi usulida xar bir foydalanuvchini foydalanish ruxsatini belgilash o’rniga rol uchun ob’ektlardan foydalanish ruxsatini ko’rsatish yetarli bo’ladi?
Role-based access control RBAC
Discretionary access control DAC
Mandatory access control MAC
Attribute based access control ABAC
38. Foydalanishni boshqarishning qaysi usulida sub’ekt va ob’ektlarga tegishli xuquqlarni ma’murlash oson kechadi?
Role-based access control RBAC
Discretionary access control DAC
Mandatory access control MAC
Attribute based access control ABAC
39. Firibgarlikni oldini olish uchun bir shaxs tomonidan ko’plab vazifalarni bajarishga ruxsat bermaslik zarur. Bu muammo foydalanishni boshqarishni qaysi usulida bartaraf etiladi?
Role-based access control RBAC
Discretionary access control DAC
Mandatory access control MAC
Attribute based access control ABAC
40. Ob’ekt va sub’ektlarning attributlari, ular bilan mumkin bo’lgan amallar va so’rovlarga mos keladigan muxit uchun qoidalarni taxlil qilish asosida foydalanishni boshqarish - ....
Attribute based access control ABAC
Discretionary access control DAC
Mandatory access control MAC
Role-based access control RBAC
Dostları ilə paylaş: |