– 17 –
Q37. In the description below of measures against spam mail, which of the following is an
appropriate combination of words to be inserted into blanks A and B?
Mr. C is tired of receiving spam mail, so he is trying to register the e-mail addresses,
from which he wants to receive e-mails, in a so that e-mails sent from the
e-mail addresses registered in the only can be .
A B
a) blacklist permitted
b) blacklist denied
c) whitelist permitted
d) whitelist denied
Q38. Which of the following is an appropriate description concerning antivirus software?
a) A virus signature file for antivirus software is a database that contains the first 16
bytes or 32 bytes of the code for each virus.
b) Virus detection with antivirus software using signature files is effective for detecting
known viruses and identifying virus names.
c) If the size of a file infected by a virus is the same as before the infection, the file can
be restored to the state before the infection by removing the virus.
d) The method of detecting a virus by monitoring suspicious behavior identifies the
virus name based on the behavioral characteristics of the virus.