- (Topic 2)
Firekiller 2000 is an example of a _____.
Correct Answer:D
- (Topic 2)
You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted, however, you want the least overhead/difficulty in the encryption process. Which of the following should you choose?
Correct Answer:D
- (Topic 2)
The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?
Correct Answer:B
- (Topic 1)
Which of the following provide data confidentiality services by encrypting the data sent between wireless systems?
Each correct answer represents a complete solution. Choose two.
Correct Answer:BC
- (Topic 2)
Which of the following refers to encrypted text?
Correct Answer:C
- (Topic 1)
According to the case study, what protocol should be used to protect a customer's privacy and credit card information?
(Click the Exhibit button on the toolbar to see the case study.)
Correct Answer:E