Exam 26: Keeping E-Mail Secure
Exam 1: Technology Impacts16 Questions
Exam 2: Understanding Bits and Bytes21 Questions
Exam 3: Doing Business Online16 Questions
Exam 4: Choosing Software18 Questions
Exam 5: Starting the Computer: the Boot Process16 Questions
Exam 6: Evaluating Your Cpu and Ram19 Questions
Exam 7: Understanding Networking17 Questions
Exam 8: Managing Digital Media13 Questions
Exam 9: Threats to Your Digital Life20 Questions
Exam 10: Understanding Software Programming17 Questions
Exam 11: Using Databases18 Questions
Exam 12: Using Servers15 Questions
Exam 13: Understanding Ip Addresses, Domain Names, and Protocols17 Questions
Exam 24: How Businesses Use Databases16 Questions
Exam 14: Extension: the Impact of Artificial Intelligence15 Questions
Exam 15: Exploring Storage Devices and Ports19 Questions
Exam 16: Evaluating Websites16 Questions
Exam 17: Buying and Installing Software16 Questions
Exam 18: Organizing Your Computer: File Management17 Questions
Exam 19: Evaluating Computer System Components16 Questions
Exam 20: Managing and Securing Your Wireless Network15 Questions
Exam 21: Understanding Intellectual Property and Copyright15 Questions
Exam 22: Understanding Firewalls16 Questions
Exam 23: a Variety of Programming Languages14 Questions
Exam 25: Transmission Media and Network Adapters15 Questions
Exam 26: Keeping E-Mail Secure16 Questions
Select questions type
A(n) ________ is a specialized computer with the sole function of storing, processing, and sending e-mail.
Free
(Short Answer)
4.8/5
(34)
Correct Answer:
e-mail server; email server
In ________ encryption, only the two parties involved in sending a message have the code to unlock the message.
Free
(Short Answer)
5.0/5
(36)
Correct Answer:
private-key; private key
________ encryption is the most commonly used encryption on the Internet.
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Public-key; Public key
Which protocol is used to transmit e-mail over the Internet?
(Multiple Choice)
4.9/5
(41)
When only the two parties involved in sending a message have the code, this is called ________-key encryption.
(Multiple Choice)
4.9/5
(27)
________ is the ability of two or more people to communicate in text over the Internet in real time.
(Multiple Choice)
4.8/5
(31)
In ________ encryption, a key pair is created, where one key is for coding and the other is for decoding.
(Short Answer)
4.9/5
(32)
Which of the following specifications is used to simplify attachments to e-mail messages?
(Multiple Choice)
4.8/5
(31)
________ is the process of encoding data so that only the person with the key can decode and read the message.
(Short Answer)
4.7/5
(31)
Which protocol uses standard Internet connections to make phone calls over the Internet?
(Multiple Choice)
4.8/5
(36)
Match each of the following terms to its definition:
I. MIME
II. VoIP
III. SMTP
IV. PGP
V. encryption
A. protocol responsible for sending e-mail along the Internet to its destination
B. public-key encryption package
C. technology used to transmit phone calls over the Internet
D. protocol used for sending attachments with e-mail
E. process of coding an e-mail so that only the recipient can read it
(Short Answer)
4.8/5
(34)
A secure website using SSL encryption will have ________ followed by ://www.websitename.com as the protocol in its URL.
(Short Answer)
4.8/5
(35)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)