PrepAway - Latest Free Exam Questions & Answers

Which of the following steps will you take to accomplish the task?

You work as a Network Administrator for Blue Well Inc. The company has a Windows Server 2008 domain-based network. All client computers on the network run Windows Vista Ultimate. Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him.
Which of the following steps will you take to accomplish the task?

PrepAway - Latest Free Exam Questions & Answers

A.
Configure phishing filter in Internet Explorer 7.0.
Configure it to filter all phishing mails.

B.
Configure phishing filter in Windows Mail.
Configure it to move such mails to the Junk Mail folder.

C.
Add domain names of such emails in the Block Sender’s list.

D.
Remove domain names of such emails from the Safe Sender’s list.

Explanation:
According to the question, Andy has an issue with phishing.
What is phishing?
Phishing is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number. An example of phishing attack is a fraudulent e-mail that appears to come from a user’s bank asking to change his online banking password. When the user clicks the link available on the e-mail, it directs him to a phishing site which replicates the original bank site. The phishing site lures the user to provide his personal information. You need to help him by filtering such phishing mails. In order to accomplish the task, you will have to take the following steps:
Configure phishing filter in Windows Mail.Configure it to move such mails to the Junk Mail folder. Open the Junk E-mail Options window through Tools menu and configure the required option in the Phishing tab.

Answer options C and D are incorrect. Adding and removing domain names of such e-mails is not the appropriate solutions here. Phishing mails can appear from any domains. These mails should be filtered through Windows Mail. Answer option A is incorrect. Internet Explorer 7.0 phishing filter helps identifying phishing Web sites. It will not help in filtering the e-mails.

One Comment on “Which of the following steps will you take to accomplish the task?


Leave a Reply