The other three choices are not related to the Web content filtering software. Web bug is a tiny image, invisible to a user, placed on Web pages in such a way to enable third parties to track use of Web servers and collect information about the user, including IP addresses, host name, browser type and version, operating system name and version, and cookies. The Web bug may contain malicious code. RED refers to data/information or messages that contain sensitive or classified information that is not encrypted, whereas BLACK refers to information that is encrypted.
20. Which of the following identifies calls originating from nonexistent telephone extensions to detect voice-mail fraud?
a.
Antihacker softwareb.
Call-accounting systemc.
Antihacker hardwared.
Toll-fraud monitoring systemCall-accounting systems provide information about hacking patterns. Antihacker software and hardware can provide multilevel passwords and a self-destruct feature that enables users to delete all messages in their mailboxes if they forget their password. Toll-fraud monitoring systems enable you to catch the voice hacker’s activities quickly as the fraud is taking place.
21. Which of the following voice-mail fraud prevention controls can be counterproductive and at the same time counterbalancing?
1.
Turning off direct inward system access ports during nonworking hours2.
Separating internal and external call-forwarding privileges3.
Implementing call vectoring4.
Disconnecting dial-in maintenance portsa.
1 and 2b.
1 and 4c.
3 and 4d.
2 and 3Emergency problems cannot be handled when the maintenance ports are disabled. Turning off direct inward system access (DISA) ports during nonworking hours and disconnecting dial-in maintenance ports are counterproductive and counterbalancing.
By separating internal and external call-forwarding privileges for internal lines, an inbound call cannot be forwarded to an outside line unless authorized. Call vectoring can be implemented by answering a call with a recorded message or nothing at all, which may frustrate an attacker. Separating internal and external call-forwarding privileges and implementing call vectoring are counterproductive and balancing.
22. Regarding instant messaging (IM), which of the following is an effective countermeasure to ensure that the enclave users
a.
Disable file-sharing featureb.
Restrict IM chat announcementsc.
Block ports at the enclave firewalld.
Install antivirus software