Question 37

- (Topic 2)
Firekiller 2000 is an example of a _____.

Correct Answer:D

Question 38

- (Topic 2)
You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted, however, you want the least overhead/difficulty in the encryption process. Which of the following should you choose?

Correct Answer:D

Question 39

- (Topic 2)
The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

Correct Answer:B

Question 40

- (Topic 1)
Which of the following provide data confidentiality services by encrypting the data sent between wireless systems?
Each correct answer represents a complete solution. Choose two.

Correct Answer:BC

Question 41

- (Topic 2)
Which of the following refers to encrypted text?

Correct Answer:C

Question 42

- (Topic 1)
According to the case study, what protocol should be used to protect a customer's privacy and credit card information?
(Click the Exhibit button on the toolbar to see the case study.)

Correct Answer:E

START GISF EXAM