Exam 14: Mail Vulnerabilities
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
____________________ is a way of tampering with e-mail so that the message received appears to be from a known and trusted person,when it is actually sent by an impostor.
Free
(Short Answer)
4.8/5
(29)
Correct Answer:
E-mail spoofing
____________________ is the practice of sending an identical e-mail repeatedly to the target user.
Free
(Short Answer)
4.9/5
(37)
Correct Answer:
E-mail bombing
____ allows users to access e-mail messages that remain on the mail server.
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
D
Attackers can disrupt network services, spread viruses, and deny service to network users by exploiting the vulnerabilities of e-mail.
(True/False)
4.9/5
(32)
SMTP, IMAP, and POP are the main protocols supporting e-mail systems all over the world.
(True/False)
4.9/5
(34)
____________________ uses e-mails from a purported financial institution (often eBay or Paypal) stating that there is something wrong with an account, and the account holder needs to log in to set it straight.
(Short Answer)
4.8/5
(35)
___________________________________ is the method used to transfer e-mail messages from one server to another or from a client computer to a server.
(Short Answer)
4.9/5
(37)
An e-mail message stored on an IMAP server can be modified from any remote location with access to Internet.
(True/False)
4.9/5
(34)
____, as a technique, is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.
(Multiple Choice)
4.9/5
(27)
A ____ entry permits hackers to take complete control of a mail system.
(Multiple Choice)
5.0/5
(37)
Firefox is a browser that is free of bugs, coding errors, or vulnerabilities.
(True/False)
4.8/5
(41)
The Morris worm created chaos on the Internet in 1988 by spreading through the ____ program.
(Multiple Choice)
4.8/5
(36)
Describe the main characteristics of buffer overflow attacks for SMTP servers.
(Essay)
4.8/5
(36)
____ are used by programs on the Internet (remote) and on a user's computer (local) to confirm the user's identity to any third party concerned.
(Multiple Choice)
4.7/5
(34)
____________________ is commercial or nuisance e-mail with no effective opt-out system.
(Short Answer)
4.9/5
(32)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)