Exam 16: E-Mail and Instant Messaging

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What TCP port does IMAP use?

(Multiple Choice)
4.9/5
(32)

Hoax e-mails can have a real impact on bandwidth and productivity due to the distraction that can be caused by them.

(True/False)
4.9/5
(38)

Viruses can exist independent of a file,whereas worms require a file to infect.

(True/False)
4.8/5
(33)

The _______________ was the first list to utilize the concept of using DNS records to filter or "blackhole" spam-sending IP addresses and domains.

(Short Answer)
4.8/5
(27)

The trends show that e-mail hoaxes are being thwarted due to new technology.

(True/False)
4.8/5
(26)

Malicious code that is scripted to send itself to other users is known as a ________.

(Multiple Choice)
4.8/5
(36)

Explain some of the problems with PGP.

(Essay)
4.9/5
(39)

PGP uses _______________ encryption.

(Multiple Choice)
4.8/5
(32)

_______________ is the method by which mail is sent to the server as well as from server to server.

(Short Answer)
4.7/5
(34)

SMTP uses TCP port 110.

(True/False)
4.9/5
(32)

The Kurt Vonnegut commencement speech,the Neiman-Marcus Chocolate Chip Cookie Recipe,and the get-well e-mails to the dying boy are examples of __________.

(Multiple Choice)
4.9/5
(27)

Which of the following is NOT one of the three primary e-mail protocols?

(Multiple Choice)
4.7/5
(43)

Unsolicited commercial e-mail is referred to as a hoax e-mail.

(True/False)
4.7/5
(36)

All of the following techniques help to secure IM communications EXCEPT which of the following?

(Multiple Choice)
4.8/5
(43)

_______________ refers to an unsolicited commercial e-mail whose purpose is the same as the junk mails in a physical mailbox;it tries to persuade the recipient buy something.

(Short Answer)
4.8/5
(28)

Unsolicited commercial e-mail is known as __________.

(Multiple Choice)
4.7/5
(21)

_______________ and _______________ are two very popular methods of encrypting e-mail.

(Short Answer)
4.8/5
(39)

Most instant messaging programs natively support encryption.

(True/False)
4.8/5
(34)

A(n)_______________ program appears to be safe,but actually has a sinister hidden purpose.

(Short Answer)
4.9/5
(27)

Briefly give two examples of how hoax e-mails work.

(Essay)
4.8/5
(37)
Showing 21 - 40 of 47
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)