GCIH Exam Question 226

Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client
computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is
concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client
computers from malware?
Each correct answer represents a complete solution. Choose two.
  • GCIH Exam Question 227

    Many organizations create network maps of their network system to visualize the network and understand the relationship between the end devices and the transport layer that provide services.
    Which of the following are the techniques used for network mapping by large organizations?
    Each correct answer represents a complete solution. Choose three.
  • GCIH Exam Question 228

    The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in
    Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows
    Address Book (WAB). Which of the following registry values can be used to identify this worm?
  • GCIH Exam Question 229

    Which of the following attacks capture the secret value like a hash and reuse it later to gain access to a system without ever decrypting or decoding the hash?
  • GCIH Exam Question 230

    What is the purpose of configuring a password protected screen saver on a computer?