Exam 16: E-Mail and Instant Messaging

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Names not on a DNS blacklist get filtered out,and those messages are not received.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

False

S/MIME is a secure implementation of the MIME protocol.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

What are two possible solutions to security threats caused by viruses?

Free
(Short Answer)
5.0/5
(45)
Correct Answer:
Verified

User education and virus scanning

The first instant messaging program was ___________.

(Multiple Choice)
4.8/5
(28)

What TCP port does SMTP use?

(Multiple Choice)
4.9/5
(35)

The two main places to filter spam are ________________.

(Multiple Choice)
4.8/5
(36)

What is a basic description of a Trojan horse?

(Essay)
4.7/5
(37)

Two tools that can be used to encrypt e-mail are ___________________.

(Multiple Choice)
4.8/5
(36)

_______________ started with mailbox programs on early time sharing machines,allowing researchers to leave messages for others using the same machine.

(Short Answer)
4.8/5
(31)

Which TCP port does POP3 use?

(Multiple Choice)
4.7/5
(38)

What is the best way to deal with e-mail hoax?

(Essay)
4.7/5
(39)

What was the primary reason for the spread of the ILOVEYOU worm.

(Multiple Choice)
4.8/5
(39)

SubSeven and Back Orifice are examples of what kinds of malicious code?

(Multiple Choice)
4.7/5
(45)

A worm is a type of virus that ____________.

(Multiple Choice)
4.8/5
(36)

One of the steps that the majority of system administrators running Internet e-mail servers have taken to reduce spam is to shut down ________.

(Multiple Choice)
4.8/5
(36)

A(n)_______________ is a mail server that will accept mail from everyone.

(Short Answer)
4.7/5
(32)

Securing e-mail is something that must be done by

(Multiple Choice)
4.9/5
(37)

Viruses that are scripted to send themselves to other users are known as ______________.

(Short Answer)
4.9/5
(34)

E-mail traffic is sent in plaintext by default and can be read easily by anyone who intercepts it.

(True/False)
4.8/5
(34)

Viruses started as simple self-replicating program that spread via the transfer of floppy disks.

(True/False)
4.9/5
(42)
Showing 1 - 20 of 47
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)