Exam 12: Electronic Mail
Exam 1: What Is a Computer Network30 Questions
Exam 2: Network Topology30 Questions
Exam 3: Networking Hardware30 Questions
Exam 4: Ethernet Technology30 Questions
Exam 5: Token-Ring, fddi, and Other LAN Technologies30 Questions
Exam 6: Network Design and Troubleshooting Scenarios30 Questions
Exam 7: Low-Level Protocols30 Questions
Exam 8: The Tcpip Protocols30 Questions
Exam 9: Ipxspx, Appletalk, and Other Network Protocols30 Questions
Exam 10: Switching and Routing30 Questions
Exam 11: Network Management and Security30 Questions
Exam 12: Electronic Mail30 Questions
Exam 13: FTP and Telnet30 Questions
Exam 14: Multimedia Networking30 Questions
Exam 15: The Internet30 Questions
Exam 16: Writing a Network Application30 Questions
Exam 17: An Introduction to Networking With Windows30 Questions
Exam 18: Windows Domains30 Questions
Exam 19: Unix and Linux30 Questions
Exam 20: Other Network Operating Systems30 Questions
Exam 21: Cryptography and Security30 Questions
Exam 22: Security Hardware30 Questions
Exam 23: Security Software30 Questions
Exam 24: Forensic Techniques30 Questions
Select questions type
A blank line is used as the separator between the parts of an email message.
Free
(True/False)
5.0/5
(33)
Correct Answer:
True
The ____ is used to deliver e-mail content securely.
Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
C
Discuss the issue with sending messages in clear text.
Free
(Essay)
4.8/5
(26)
Correct Answer:
Messages sent via e-mail are transmitted in clear text.This means that there is no encryption or other encoding used to hide important information,such as the username and password of the e-mail account.If you dig through a packet capture of an e-mail transmission,you can easily locate these items in the USER and PASS command captures.E-mail can be secured using two different types of encryption methods (Secure MIME via public-key encryption or Pretty Good Privacy).
The ____________________ encoding method is used to encode 8-bit text codes such as those used in a foreign language character set into 7-bit U.S.ASCII characters.
(Short Answer)
4.8/5
(32)
Electronic mail uses the ____ model to allow mail messages to be exchanged.
(Multiple Choice)
4.8/5
(31)
Match each item with a statement below.
-First part of an email message
(Multiple Choice)
5.0/5
(37)
____ provide a way for binary programs,graphical images,or other types of files to be attached to an e-mail message.
(Multiple Choice)
4.8/5
(26)
Two of the most common e-mail errors stem from the user incorrectly specifying either ____.
(Multiple Choice)
4.9/5
(33)
The mailbox portion of the address is often made from a user's ____.
(Multiple Choice)
4.8/5
(40)
Match each item with a statement below.
-Used primarily to transfer binary attachments
(Multiple Choice)
4.9/5
(28)
Using a protocol analyzer,it is possible to capture all of the activity associated with sending an electronic mail message.
(True/False)
4.9/5
(38)
Managing e-mail with ____ allows for complete access to messages stored on the server from as many client computers as necessary.
(Multiple Choice)
4.8/5
(32)
____________________ is used to exchange messages between servers or between a client and a server.
(Short Answer)
4.9/5
(29)
A(n)____ consists of a keyword followed by a colon and additional information.
(Multiple Choice)
4.7/5
(40)
Why should public e-mail client computer systems never be configured to save an e-mail password?
(Essay)
4.8/5
(38)
The second part of an email message is called the ____________________ and contains the actual text of the message.
(Short Answer)
4.7/5
(36)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)