Exam 11: Security Topics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

E-mail messages are stored in plain, unencrypted text on SMTP servers.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

The OS provides its services through a well-defined ____.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

D

____ is a set of automated methods for recognizing or verifying the identity of a person based on a physiological or behavioral characteristic.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

C

____ is a network layer protocol. It performs tasks such as routing, carrying datagrams, and mapping an Internet address to a physical network address.

(Multiple Choice)
4.8/5
(36)

The SMTP server supports two common protocols for e-mail retrieval: IMAP and ____.

(Multiple Choice)
4.9/5
(36)

A ____ is a representation of the security policy of the OS.

(Multiple Choice)
4.9/5
(39)

A(n) ____________________ is the fundamental component of the computer system.

(Short Answer)
4.9/5
(41)

____ and segmentation can provide a way of managing main memory.

(Multiple Choice)
4.8/5
(35)

A(n) ____ firewall provides the highest level of security and provides full application layer awareness without interposing a proxy server.

(Multiple Choice)
4.9/5
(26)

What are the e-mail security problems addressed by asymmetric key encryption used in conjunction with SSL?

(Essay)
4.9/5
(39)

Briefly describe e-mail identity spoofing.

(Essay)
4.7/5
(35)

____ is the first step in providing security for databases.

(Multiple Choice)
5.0/5
(26)

A(n) ____________________ is a repository or store of data that has an internal organization using a particular format.

(Short Answer)
5.0/5
(37)

Describe the mail access vulnerability.

(Essay)
4.9/5
(36)

The term ____________________ is applied to a software product that manages the creation, modification, and deletion of database objects such as databases instances and users.

(Short Answer)
4.9/5
(38)

What are the scenarios that can result from using SMTP protocol for delivering e-mail messages?

(Essay)
4.9/5
(39)

The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.

(Multiple Choice)
4.9/5
(25)

____________________ is the de facto standard for e-mail transmission.

(Short Answer)
4.9/5
(32)

What are the four types of separation supported by an OS?

(Essay)
4.7/5
(39)

All e-mail servers communicate with each other using ____.

(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)