For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Hot Area:
DRAG DROP
Certain potentially harmful file types should be filtered as attachments of incoming email messages.
Match the file extension that should be filtered with its description.
Instructions: To answer, drag the appropriate file extension from the column on the left to its description on the right. Each file extension may be used once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.
Note: For each correct selection is worth one point.
Select and Place:
A digitally signed e-mail message:
A. Validates the recipient
B. Validates the sender
C. Is encrypted
D. Is virus-free
The primary method of authentication in an SSL connection is passwords.
To answer, choose the option "No change is needed" if the underlined text is correct. If the underlined text is not correct, choose the correct answer.
A. No change is needed
B. Certificates
C. IPsec
D. Biometrics
E-mail spoofing:
A. Forwards e-mail messages to all contacts
B. Copies e-mail messages sent from a specific user
C. Obscures the true e-mail sender
D. Modifies e-mail routing logs
You suspect a user's computer is infected by a virus. What should you do first?
A. Restart the computer in safe mode
B. Replace the computer's hard disk drive
C. Disconnect the computer from the network
D. Install antivirus software on the computer
A malicious user who intercepts and modifies communications is known as a:
A. red hat hacker
B. white hat hacker
C. network sniffer
D. man-in-the-middle
Which of the following infects the computer and then hides itself from detection by antivirus software?
A. EICAR virus
B. Boot-sector virus
C. Macro virus
D. Stealth virus
In which of the following is the file audit events are written when auditing is enabled?
A. File system ACL
B. Biometric device
C. Network Access Control List
D. Security event log
Which of the following are the features of security level in the Restricted Sites zone
A. The protection against harmful content is provided.
B. The maximum safeguards are used.
C. Most of the features are disabled.
D. The default security level is low.