Deck 12: Electronic Mail

Full screen (f)
exit full mode
Question
E-Mail is a common source of distributing worms and viruses.
Use Space or
up arrow
down arrow
to flip the card.
Question
A Telnet session to a POP3 server is accomplished by entering a command similar to ____.

A) telnet athena.sunybroome.edu 25
B) telnet athena.sunybroome.edu 1101
C) telnet athena.sunybroome.edu 110
D) telnet 110 athena.sunybroome.edu
Question
Electronic mail uses the ____ model to allow mail messages to be exchanged.

A) client-server
B) client-client
C) servlet-servlet
D) server-server
Question
The ____ is used to deliver e-mail content securely.

A) Safe Multipurpose Internet Mail Extensions
B) Secure Multipurpose Interface Mail Enabler
C) Secure Multipurpose Internet Mail Extensions
D) Secure Multipurpose Internet Mail Environment
Question
Using a protocol analyzer, it is possible to capture all of the activity associated with sending an electronic mail message.
Question
In order to use any e-mail client program, it must be ____________________ properly.
Question
The current version of IMAP is ____.

A) IMAP3rev1
B) IMAP3rev4
C) IMAP4rev1
D) IMAP4rev4
Question
____ provide a way for binary programs, graphical images, or other types of files to be attached to an e-mail message.

A) Multipurpose Internet Mail Environments
B) Multipurpose Interface Mail Extensions
C) Multipurpose Internet Management Extensions
D) Multipurpose Internet Mail Extensions
Question
A(n) ____________________ program exchanges information with a designated e-mail server to send and receive messages.
Question
A blank line is used as the separator between the parts of an email message.
Question
The Internet Network Authority is responsible for maintenance of the Top Level Domains.
Question
The mailbox portion of the address is often made from a user's ____.

A) home address
B) first name
C) server name
D) account name
Question
A(n) ____ consists of a keyword followed by a colon and additional information.

A) body
B) header
C) message
D) address
Question
____ is designed to eliminate the typical problems that are caused by downloading the electronic messages to a client computer using the Post Office Protocol.

A) SMTP
B) IMAP
C) HTTP
D) RPC
Question
Managing e-mail with ____ allows for complete access to messages stored on the server from as many client computers as necessary.

A) IMAP
B) POP3
C) SMTP
D) IMAM
Question
The second part of an email message is called the ____________________ and contains the actual text of the message.
Question
The ____________________ encoding method is used to encode 8-bit text codes such as those used in a foreign language character set into 7-bit U.S. ASCII characters.
Question
____________________ is used to exchange messages between servers or between a client and a server.
Question
Two of the most common e-mail errors stem from the user incorrectly specifying either ____.

A) the mailbox name or the computer name
B) the username or the mailbox name
C) the computer name or the server name
D) the username or the user's address
Question
IMAP does not provide direct access to the messages that are stored on the server.
Question
List three features that the MIME standard provides.
Question
Match between columns
A protocol designed to provide access to electronic messages that are stored on a mail server
SMTP
A protocol designed to provide access to electronic messages that are stored on a mail server
Header
A protocol designed to provide access to electronic messages that are stored on a mail server
Base64 encoding method
A protocol designed to provide access to electronic messages that are stored on a mail server
IMAP
A protocol designed to provide access to electronic messages that are stored on a mail server
IMAP4
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
SMTP
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
Header
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
Base64 encoding method
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
IMAP
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
IMAP4
Used primarily to transfer binary attachments
SMTP
Used primarily to transfer binary attachments
Header
Used primarily to transfer binary attachments
Base64 encoding method
Used primarily to transfer binary attachments
IMAP
Used primarily to transfer binary attachments
IMAP4
First part of an email message
SMTP
First part of an email message
Header
First part of an email message
Base64 encoding method
First part of an email message
IMAP
First part of an email message
IMAP4
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
SMTP
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
Header
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
Base64 encoding method
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
IMAP
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
IMAP4
Question
Describe the features of IMAP4rev1.
Question
Why should public e-mail client computer systems never be configured to save an e-mail password?
Question
What is IMAP and what does it do?
Question
Discuss the issue with sending messages in clear text.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/26
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Electronic Mail
1
E-Mail is a common source of distributing worms and viruses.
True
2
A Telnet session to a POP3 server is accomplished by entering a command similar to ____.

A) telnet athena.sunybroome.edu 25
B) telnet athena.sunybroome.edu 1101
C) telnet athena.sunybroome.edu 110
D) telnet 110 athena.sunybroome.edu
C
3
Electronic mail uses the ____ model to allow mail messages to be exchanged.

A) client-server
B) client-client
C) servlet-servlet
D) server-server
A
4
The ____ is used to deliver e-mail content securely.

A) Safe Multipurpose Internet Mail Extensions
B) Secure Multipurpose Interface Mail Enabler
C) Secure Multipurpose Internet Mail Extensions
D) Secure Multipurpose Internet Mail Environment
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
5
Using a protocol analyzer, it is possible to capture all of the activity associated with sending an electronic mail message.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
6
In order to use any e-mail client program, it must be ____________________ properly.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
7
The current version of IMAP is ____.

A) IMAP3rev1
B) IMAP3rev4
C) IMAP4rev1
D) IMAP4rev4
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
8
____ provide a way for binary programs, graphical images, or other types of files to be attached to an e-mail message.

A) Multipurpose Internet Mail Environments
B) Multipurpose Interface Mail Extensions
C) Multipurpose Internet Management Extensions
D) Multipurpose Internet Mail Extensions
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
9
A(n) ____________________ program exchanges information with a designated e-mail server to send and receive messages.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
10
A blank line is used as the separator between the parts of an email message.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
11
The Internet Network Authority is responsible for maintenance of the Top Level Domains.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
12
The mailbox portion of the address is often made from a user's ____.

A) home address
B) first name
C) server name
D) account name
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) ____ consists of a keyword followed by a colon and additional information.

A) body
B) header
C) message
D) address
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
14
____ is designed to eliminate the typical problems that are caused by downloading the electronic messages to a client computer using the Post Office Protocol.

A) SMTP
B) IMAP
C) HTTP
D) RPC
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
15
Managing e-mail with ____ allows for complete access to messages stored on the server from as many client computers as necessary.

A) IMAP
B) POP3
C) SMTP
D) IMAM
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
16
The second part of an email message is called the ____________________ and contains the actual text of the message.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
17
The ____________________ encoding method is used to encode 8-bit text codes such as those used in a foreign language character set into 7-bit U.S. ASCII characters.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
18
____________________ is used to exchange messages between servers or between a client and a server.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
19
Two of the most common e-mail errors stem from the user incorrectly specifying either ____.

A) the mailbox name or the computer name
B) the username or the mailbox name
C) the computer name or the server name
D) the username or the user's address
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
20
IMAP does not provide direct access to the messages that are stored on the server.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
21
List three features that the MIME standard provides.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
A protocol designed to provide access to electronic messages that are stored on a mail server
SMTP
A protocol designed to provide access to electronic messages that are stored on a mail server
Header
A protocol designed to provide access to electronic messages that are stored on a mail server
Base64 encoding method
A protocol designed to provide access to electronic messages that are stored on a mail server
IMAP
A protocol designed to provide access to electronic messages that are stored on a mail server
IMAP4
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
SMTP
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
Header
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
Base64 encoding method
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
IMAP
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
IMAP4
Used primarily to transfer binary attachments
SMTP
Used primarily to transfer binary attachments
Header
Used primarily to transfer binary attachments
Base64 encoding method
Used primarily to transfer binary attachments
IMAP
Used primarily to transfer binary attachments
IMAP4
First part of an email message
SMTP
First part of an email message
Header
First part of an email message
Base64 encoding method
First part of an email message
IMAP
First part of an email message
IMAP4
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
SMTP
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
Header
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
Base64 encoding method
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
IMAP
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
IMAP4
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
23
Describe the features of IMAP4rev1.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
24
Why should public e-mail client computer systems never be configured to save an e-mail password?
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
25
What is IMAP and what does it do?
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
26
Discuss the issue with sending messages in clear text.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 26 flashcards in this deck.