Exam 12: Electronic Mail
Exam 1: What Is a Computer Network26 Questions
Exam 2: Network Topology26 Questions
Exam 3: Networking Hardware26 Questions
Exam 4: Ethernet Technology26 Questions
Exam 5: Token-Ring, Fddi, and Other Lan Technologies26 Questions
Exam 6: Network Design and Troubleshooting Scenarios26 Questions
Exam 7: Low-Level Protocols26 Questions
Exam 8: The Tcpip Protocols26 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols26 Questions
Exam 10: Switching and Routing26 Questions
Exam 11: Network Management and Security26 Questions
Exam 12: Electronic Mail26 Questions
Exam 13: Ftp and Telnet26 Questions
Exam 14: Multimedia Networking26 Questions
Exam 15: The Internet26 Questions
Exam 16: Writing a Network Application26 Questions
Exam 17: An Introduction to Networking With Windows26 Questions
Exam 18: Windows Domains26 Questions
Exam 19: Unix and Linux26 Questions
Exam 20: Other Network Operating Systems26 Questions
Exam 21: Cryptography and Security26 Questions
Exam 22: Security Hardware26 Questions
Exam 23: Security Software26 Questions
Exam 24: Forensic Techniques26 Questions
Select questions type
Describe the features of IMAP4rev1.
Free
(Essay)
4.7/5
(29)
Correct Answer:
The current version of IMAP, IMAP4rev1, provides full compatibility with the Internet and MIME standards. In addition, IMAP4 includes several other new features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer.
Managing e-mail with ____ allows for complete access to messages stored on the server from as many client computers as necessary.
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
A
A Telnet session to a POP3 server is accomplished by entering a command similar to ____.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
C
The ____________________ encoding method is used to encode 8-bit text codes such as those used in a foreign language character set into 7-bit U.S. ASCII characters.
(Short Answer)
4.9/5
(42)
____ is designed to eliminate the typical problems that are caused by downloading the electronic messages to a client computer using the Post Office Protocol.
(Multiple Choice)
4.7/5
(36)
The mailbox portion of the address is often made from a user's ____.
(Multiple Choice)
4.9/5
(29)
A(n) ____________________ program exchanges information with a designated e-mail server to send and receive messages.
(Short Answer)
4.8/5
(40)
Two of the most common e-mail errors stem from the user incorrectly specifying either ____.
(Multiple Choice)
4.9/5
(34)
____________________ is used to exchange messages between servers or between a client and a server.
(Short Answer)
4.9/5
(30)
The second part of an email message is called the ____________________ and contains the actual text of the message.
(Short Answer)
4.8/5
(28)
Electronic mail uses the ____ model to allow mail messages to be exchanged.
(Multiple Choice)
4.8/5
(27)
A(n) ____ consists of a keyword followed by a colon and additional information.
(Multiple Choice)
4.8/5
(37)
Using a protocol analyzer, it is possible to capture all of the activity associated with sending an electronic mail message.
(True/False)
4.9/5
(40)
Why should public e-mail client computer systems never be configured to save an e-mail password?
(Essay)
4.9/5
(33)
In order to use any e-mail client program, it must be ____________________ properly.
(Short Answer)
4.8/5
(41)
Showing 1 - 20 of 26
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)