Exam 26: Keeping E-Mail Secure

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A(n) ________ is a specialized computer with the sole function of storing, processing, and sending e-mail.

Free
(Short Answer)
4.8/5
(34)
Correct Answer:
Verified

e-mail server; email server

In ________ encryption, only the two parties involved in sending a message have the code to unlock the message.

Free
(Short Answer)
5.0/5
(36)
Correct Answer:
Verified

private-key; private key

________ encryption is the most commonly used encryption on the Internet.

Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Verified

Public-key; Public key

Which protocol is used to transmit e-mail over the Internet?

(Multiple Choice)
4.9/5
(41)

When only the two parties involved in sending a message have the code, this is called ________-key encryption.

(Multiple Choice)
4.9/5
(27)

________ is the ability of two or more people to communicate in text over the Internet in real time.

(Multiple Choice)
4.8/5
(31)

MIME is primarily associated with this feature of e-mail.

(Essay)
4.9/5
(29)

In ________ encryption, a key pair is created, where one key is for coding and the other is for decoding.

(Short Answer)
4.9/5
(32)

Which of the following specifications is used to simplify attachments to e-mail messages?

(Multiple Choice)
4.8/5
(31)

A good way to protect your e-mails is to use ________.

(Multiple Choice)
4.8/5
(39)

________ is the process of encoding data so that only the person with the key can decode and read the message.

(Short Answer)
4.7/5
(31)

________ technology is used to make free long-distance calls.

(Short Answer)
4.8/5
(33)

Which protocol uses standard Internet connections to make phone calls over the Internet?

(Multiple Choice)
4.8/5
(36)

Match each of the following terms to its definition: I. MIME II. VoIP III. SMTP IV. PGP V. encryption A. protocol responsible for sending e-mail along the Internet to its destination B. public-key encryption package C. technology used to transmit phone calls over the Internet D. protocol used for sending attachments with e-mail E. process of coding an e-mail so that only the recipient can read it

(Short Answer)
4.8/5
(34)

A secure website using SSL encryption will have ________ followed by ://www.websitename.com as the protocol in its URL.

(Short Answer)
4.8/5
(35)

Which of the following is an example of an e-mail client?

(Multiple Choice)
4.9/5
(38)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)