Exam 14: Mail Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ is a way of tampering with e-mail so that the message received appears to be from a known and trusted person,when it is actually sent by an impostor.

Free
(Short Answer)
4.8/5
(29)
Correct Answer:
Verified

E-mail spoofing

____________________ is the practice of sending an identical e-mail repeatedly to the target user.

Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Verified

E-mail bombing

____ allows users to access e-mail messages that remain on the mail server.

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

D

Attackers can disrupt network services, spread viruses, and deny service to network users by exploiting the vulnerabilities of e-mail.

(True/False)
4.9/5
(32)

SMTP, IMAP, and POP are the main protocols supporting e-mail systems all over the world.

(True/False)
4.9/5
(34)

What are the functions of IMAP?

(Essay)
4.7/5
(27)

____________________ uses e-mails from a purported financial institution (often eBay or Paypal) stating that there is something wrong with an account, and the account holder needs to log in to set it straight.

(Short Answer)
4.8/5
(35)

___________________________________ is the method used to transfer e-mail messages from one server to another or from a client computer to a server.

(Short Answer)
4.9/5
(37)

How can an SMTP server be exploited?

(Essay)
4.9/5
(25)

An e-mail message stored on an IMAP server can be modified from any remote location with access to Internet.

(True/False)
4.9/5
(34)

____, as a technique, is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.

(Multiple Choice)
4.9/5
(27)

A ____ entry permits hackers to take complete control of a mail system.

(Multiple Choice)
5.0/5
(37)

Firefox is a browser that is free of bugs, coding errors, or vulnerabilities.

(True/False)
4.8/5
(41)

Most corporate mail servers allow third-party mail relaying.

(True/False)
4.8/5
(38)

The Morris worm created chaos on the Internet in 1988 by spreading through the ____ program.

(Multiple Choice)
4.8/5
(36)

Describe the main characteristics of buffer overflow attacks for SMTP servers.

(Essay)
4.8/5
(36)

____ are used by programs on the Internet (remote) and on a user's computer (local) to confirm the user's identity to any third party concerned.

(Multiple Choice)
4.7/5
(34)

____________________ is commercial or nuisance e-mail with no effective opt-out system.

(Short Answer)
4.9/5
(32)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)