Exam 12: Electronic Mail

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A blank line is used as the separator between the parts of an email message.

Free
(True/False)
5.0/5
(33)
Correct Answer:
Verified

True

The ____ is used to deliver e-mail content securely.

Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
Verified

C

Discuss the issue with sending messages in clear text.

Free
(Essay)
4.8/5
(26)
Correct Answer:
Verified

Messages sent via e-mail are transmitted in clear text.This means that there is no encryption or other encoding used to hide important information,such as the username and password of the e-mail account.If you dig through a packet capture of an e-mail transmission,you can easily locate these items in the USER and PASS command captures.E-mail can be secured using two different types of encryption methods (Secure MIME via public-key encryption or Pretty Good Privacy).

The ____________________ encoding method is used to encode 8-bit text codes such as those used in a foreign language character set into 7-bit U.S.ASCII characters.

(Short Answer)
4.8/5
(32)

Electronic mail uses the ____ model to allow mail messages to be exchanged.

(Multiple Choice)
4.8/5
(31)

The current version of IMAP is ____.

(Multiple Choice)
4.8/5
(31)

Match each item with a statement below. -First part of an email message

(Multiple Choice)
5.0/5
(37)

____ provide a way for binary programs,graphical images,or other types of files to be attached to an e-mail message.

(Multiple Choice)
4.8/5
(26)

Two of the most common e-mail errors stem from the user incorrectly specifying either ____.

(Multiple Choice)
4.9/5
(33)

List three features that the MIME standard provides.

(Essay)
4.8/5
(40)

What is IMAP and what does it do?

(Essay)
4.9/5
(31)

The mailbox portion of the address is often made from a user's ____.

(Multiple Choice)
4.8/5
(40)

Match each item with a statement below. -Used primarily to transfer binary attachments

(Multiple Choice)
4.9/5
(28)

Describe the features of IMAP4rev1.

(Essay)
4.8/5
(37)

Using a protocol analyzer,it is possible to capture all of the activity associated with sending an electronic mail message.

(True/False)
4.9/5
(38)

Managing e-mail with ____ allows for complete access to messages stored on the server from as many client computers as necessary.

(Multiple Choice)
4.8/5
(32)

____________________ is used to exchange messages between servers or between a client and a server.

(Short Answer)
4.9/5
(29)

A(n)____ consists of a keyword followed by a colon and additional information.

(Multiple Choice)
4.7/5
(40)

Why should public e-mail client computer systems never be configured to save an e-mail password?

(Essay)
4.8/5
(38)

The second part of an email message is called the ____________________ and contains the actual text of the message.

(Short Answer)
4.7/5
(36)
Showing 1 - 20 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)