Exam 10: E-Mail Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

POP and IMAP are designed to enable ____________________ and retrieval of e-mail messages.

Free
(Short Answer)
4.9/5
(31)
Correct Answer:
Verified

storage

In an SMTP address header, the _____ is the dotted-decimal address of the SMTP server.

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

D

When an e-mail message is sent, what type of program is used to compose and read an e-mail message?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

A

In 1998, 40-bit and 56-bit DES encryption techniques were added to ____________________.

(Short Answer)
4.9/5
(41)

Using POP3 can be a disadvantage for ____________________, because messages are not previewed before they are downloaded.

(Short Answer)
4.9/5
(23)

  In the figure above, where is an attacker most likely to attempt to intercept e-mail transmissions? In the figure above, where is an attacker most likely to attempt to intercept e-mail transmissions?

(Multiple Choice)
4.7/5
(42)

SMTP processes e-mail through a queue that serves as a _____ for users that connect to that server.

(Multiple Choice)
4.8/5
(38)

List four popular e-mail tools that are in use today.

(Essay)
4.8/5
(31)

PGP enables the use of X.509 or PGP digital certificates, which are essentially public keys given to the recipient of the e-mail communication.

(True/False)
4.8/5
(34)

SMTP was proposed in 1982 by Jon Postel and began, in part, as an alternative to FTP for sending a file from one computer system to another.

(True/False)
4.7/5
(34)

Does all software that sends e-mail through the Internet use SMTP?

(True/False)
4.8/5
(37)

Which of the following encryption methods are supported by GPG?

(Multiple Choice)
4.9/5
(31)

Does a DNS server convert a computer or domain name to an IP address, or an IP address to a computer or domain name, in a process called resolution?

(True/False)
4.8/5
(37)

What four authentication methods can Apple Mail use for verifying access to an e-mail account?

(Essay)
4.7/5
(33)

List five pieces of information that an SMTP address header may contain.

(Essay)
4.7/5
(44)

SMTP does not require use of a(n) ____________________ and password for the remote system.

(Short Answer)
5.0/5
(38)

Which of the following is unrequested e-mail that is sent to hundreds, thousands, or even millions of users?

(Multiple Choice)
4.9/5
(29)

When using only SMTP, no line can be longer than 1000 characters.

(True/False)
4.9/5
(35)

In 2002, which type of security was added to S/MIME?

(Multiple Choice)
4.9/5
(33)

What command does an attacker use to send the contents of a malicious file into the port-scanning software, directing the port scanner to send it to the target SMTP server on port 25?

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)