The other three choices are not related to the Web content filtering software. Web bug is a tiny image, invisible to a user, placed on Web pages in such a way to enable third parties to track use of Web servers and collect information about the user, including IP addresses, host name, browser type and version, operating system name and version, and cookies. The Web bug may contain malicious code. RED refers to data/information or messages that contain sensitive or classified information that is not encrypted, whereas BLACK refers to information that is encrypted.
20. Which of the following identifies calls originating from nonexistent telephone extensions to detect voice-mail fraud?
a. Antihacker software
b. Call-accounting system
c. Antihacker hardware
d. Toll-fraud monitoring system
Call-accounting systems provide information about hacking patterns. Antihacker software and hardware can provide multilevel passwords and a self-destruct feature that enables users to delete all messages in their mailboxes if they forget their password. Toll-fraud monitoring systems enable you to catch the voice hacker’s activities quickly as the fraud is taking place.
21. Which of the following voice-mail fraud prevention controls can be counterproductive and at the same time counterbalancing?
1. Turning off direct inward system access ports during nonworking hours
2. Separating internal and external call-forwarding privileges
3. Implementing call vectoring
4. Disconnecting dial-in maintenance ports
a. 1 and 2
b. 1 and 4
c. 3 and 4
d. 2 and 3
Emergency problems cannot be handled when the maintenance ports are disabled. Turning off direct inward system access (DISA) ports during nonworking hours and disconnecting dial-in maintenance ports are counterproductive and counterbalancing.
By separating internal and external call-forwarding privileges for internal lines, an inbound call cannot be forwarded to an outside line unless authorized. Call vectoring can be implemented by answering a call with a recorded message or nothing at all, which may frustrate an attacker. Separating internal and external call-forwarding privileges and implementing call vectoring are counterproductive and balancing.
22. Regarding instant messaging (IM), which of the following is an effective countermeasure to ensure that the enclave users
a. Disable file-sharing feature
b. Restrict IM chat announcements
c. Block ports at the enclave firewall
d. Install antivirus software