Deck 16: E-Mail and Instant Messaging

Full screen (f)
exit full mode
Question
One of the largest security problems with IM programs is ___________.

A)their inability to share files
B)the lack of support for encryption
C)the lack of support for video
D)the lack of support for hiding online presence
Use Space or
up arrow
down arrow
to flip the card.
Question
Unsolicited commercial e-mail is known as __________.

A)hoax e-mail
B)worm
C)spam
D)spork
Question
What TCP port does IMAP use?

A)110
B)25
C)143
D)443
Question
A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a ____________.

A)virus
B)hoax
C)Trojan
D)worm
Question
PGP uses _______________ encryption.

A)symmetric
B)asymmetric
C)shared key
D)elliptical
Question
All of the following techniques help to secure IM communications EXCEPT which of the following?

A)Running a corporate IM server
B)Using a different user name
C)Avoiding file transfers
D)Using encryption
Question
One of the steps that the majority of system administrators running Internet e-mail servers have taken to reduce spam is to shut down ________.

A)spam filters
B)mail relaying
C)e-mail attachments
D)Outlook Express
Question
Which TCP port does POP3 use?

A)25
B)110
C)143
D)443
Question
Malicious code that is scripted to send itself to other users is known as a ________.

A)virus
B)worm
C)Trojan
D)logic bomb
Question
Two tools that can be used to encrypt e-mail are ___________________.

A)MIME/S and PGP
B)PGP and S/MIME
C)PSP and MIME/S
D)PGP and SIME
Question
Which of the following is NOT one of the three primary e-mail protocols?

A)SMTP
B)SNMP
C)P3OP
D)IMAP
Question
The two main places to filter spam are ________________.

A)at the host itself and the server
B)the firewall and the LAN
C)the proxy server and the LAN
D)the host and the firewall
Question
The Kurt Vonnegut commencement speech,the Neiman-Marcus Chocolate Chip Cookie Recipe,and the get-well e-mails to the dying boy are examples of __________.

A)social engineering
B)hoax e-mails
C)e-mail viruses
D)worms
Question
What was the primary reason for the spread of the ILOVEYOU worm.

A)Network firewalls failed.
B)Systems did not have the appropriate software patch.
C)Automatic execution such as Microsoft Outlook's preview pane.
D)Virus scan software was not updated.
Question
A worm is a type of virus that ____________.

A)is scripted to send itself to other systems
B)is designed to crawl in under a firewall
C)buries itself between the kernel and the application layer of the operating system
D)is passed through e-mails with a subject heading that has the word "worm" in it
Question
The first instant messaging program was ___________.

A)AOL Instant Messenger
B)Yahoo Instant Messenger
C)MSN Instant Messenger
D)Linux Instant Messenger
Question
What TCP port does SMTP use?

A)25
B)110
C)143
D)443
Question
SubSeven and Back Orifice are examples of what kinds of malicious code?

A)Virus
B)Hoax
C)Worm
D)Trojan
Question
One of the ways spam is able to propagate is by taking advantage of servers that will accept e-mail from anyone;these are known as ___________.

A)open servers
B)server relays
C)open relays
D)relay servers
Question
Securing e-mail is something that must be done by

A)Networking administrators
B)Security administrators
C)Outlook express
D)Users
Question
_______________ and _______________ are two very popular methods of encrypting e-mail.
Question
The trends show that e-mail hoaxes are being thwarted due to new technology.
Question
_______________ e-mails travel from user to user because of the compelling story contained in them.
Question
Most instant messaging programs natively support encryption.
Question
A(n)_______________ program appears to be safe,but actually has a sinister hidden purpose.
Question
S/MIME is a secure implementation of the MIME protocol.
Question
Hoax e-mails can have a real impact on bandwidth and productivity due to the distraction that can be caused by them.
Question
The _______________ was the first list to utilize the concept of using DNS records to filter or "blackhole" spam-sending IP addresses and domains.
Question
Viruses can exist independent of a file,whereas worms require a file to infect.
Question
_______________ refers to an unsolicited commercial e-mail whose purpose is the same as the junk mails in a physical mailbox;it tries to persuade the recipient buy something.
Question
Unsolicited commercial e-mail is referred to as a hoax e-mail.
Question
Viruses started as simple self-replicating program that spread via the transfer of floppy disks.
Question
_______________ is the method by which mail is sent to the server as well as from server to server.
Question
SMTP uses TCP port 110.
Question
_______________ started with mailbox programs on early time sharing machines,allowing researchers to leave messages for others using the same machine.
Question
Viruses that are scripted to send themselves to other users are known as ______________.
Question
_______________ code is often sent through e-mail,and performs something harmful to the computer it runs in
Question
Names not on a DNS blacklist get filtered out,and those messages are not received.
Question
E-mail traffic is sent in plaintext by default and can be read easily by anyone who intercepts it.
Question
A(n)_______________ is a mail server that will accept mail from everyone.
Question
What are two possible solutions to security threats caused by viruses?
Question
Briefly give two examples of how hoax e-mails work.
Question
What is a basic description of a Trojan horse?
Question
Explain some of the problems with PGP.
Question
What is the best way to deal with e-mail hoax?
Question
Explain some of the problems with S/MIME's implementation.
Question
Define spam.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/47
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: E-Mail and Instant Messaging
1
One of the largest security problems with IM programs is ___________.

A)their inability to share files
B)the lack of support for encryption
C)the lack of support for video
D)the lack of support for hiding online presence
B
2
Unsolicited commercial e-mail is known as __________.

A)hoax e-mail
B)worm
C)spam
D)spork
C
3
What TCP port does IMAP use?

A)110
B)25
C)143
D)443
C
4
A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a ____________.

A)virus
B)hoax
C)Trojan
D)worm
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
5
PGP uses _______________ encryption.

A)symmetric
B)asymmetric
C)shared key
D)elliptical
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
6
All of the following techniques help to secure IM communications EXCEPT which of the following?

A)Running a corporate IM server
B)Using a different user name
C)Avoiding file transfers
D)Using encryption
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
7
One of the steps that the majority of system administrators running Internet e-mail servers have taken to reduce spam is to shut down ________.

A)spam filters
B)mail relaying
C)e-mail attachments
D)Outlook Express
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
8
Which TCP port does POP3 use?

A)25
B)110
C)143
D)443
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
9
Malicious code that is scripted to send itself to other users is known as a ________.

A)virus
B)worm
C)Trojan
D)logic bomb
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
10
Two tools that can be used to encrypt e-mail are ___________________.

A)MIME/S and PGP
B)PGP and S/MIME
C)PSP and MIME/S
D)PGP and SIME
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT one of the three primary e-mail protocols?

A)SMTP
B)SNMP
C)P3OP
D)IMAP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
12
The two main places to filter spam are ________________.

A)at the host itself and the server
B)the firewall and the LAN
C)the proxy server and the LAN
D)the host and the firewall
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
13
The Kurt Vonnegut commencement speech,the Neiman-Marcus Chocolate Chip Cookie Recipe,and the get-well e-mails to the dying boy are examples of __________.

A)social engineering
B)hoax e-mails
C)e-mail viruses
D)worms
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
14
What was the primary reason for the spread of the ILOVEYOU worm.

A)Network firewalls failed.
B)Systems did not have the appropriate software patch.
C)Automatic execution such as Microsoft Outlook's preview pane.
D)Virus scan software was not updated.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
15
A worm is a type of virus that ____________.

A)is scripted to send itself to other systems
B)is designed to crawl in under a firewall
C)buries itself between the kernel and the application layer of the operating system
D)is passed through e-mails with a subject heading that has the word "worm" in it
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
16
The first instant messaging program was ___________.

A)AOL Instant Messenger
B)Yahoo Instant Messenger
C)MSN Instant Messenger
D)Linux Instant Messenger
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
17
What TCP port does SMTP use?

A)25
B)110
C)143
D)443
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
18
SubSeven and Back Orifice are examples of what kinds of malicious code?

A)Virus
B)Hoax
C)Worm
D)Trojan
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
19
One of the ways spam is able to propagate is by taking advantage of servers that will accept e-mail from anyone;these are known as ___________.

A)open servers
B)server relays
C)open relays
D)relay servers
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
20
Securing e-mail is something that must be done by

A)Networking administrators
B)Security administrators
C)Outlook express
D)Users
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
21
_______________ and _______________ are two very popular methods of encrypting e-mail.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
22
The trends show that e-mail hoaxes are being thwarted due to new technology.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
23
_______________ e-mails travel from user to user because of the compelling story contained in them.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
24
Most instant messaging programs natively support encryption.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
25
A(n)_______________ program appears to be safe,but actually has a sinister hidden purpose.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
26
S/MIME is a secure implementation of the MIME protocol.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
27
Hoax e-mails can have a real impact on bandwidth and productivity due to the distraction that can be caused by them.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
28
The _______________ was the first list to utilize the concept of using DNS records to filter or "blackhole" spam-sending IP addresses and domains.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
29
Viruses can exist independent of a file,whereas worms require a file to infect.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
30
_______________ refers to an unsolicited commercial e-mail whose purpose is the same as the junk mails in a physical mailbox;it tries to persuade the recipient buy something.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
31
Unsolicited commercial e-mail is referred to as a hoax e-mail.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
32
Viruses started as simple self-replicating program that spread via the transfer of floppy disks.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
33
_______________ is the method by which mail is sent to the server as well as from server to server.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
34
SMTP uses TCP port 110.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
35
_______________ started with mailbox programs on early time sharing machines,allowing researchers to leave messages for others using the same machine.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
36
Viruses that are scripted to send themselves to other users are known as ______________.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
37
_______________ code is often sent through e-mail,and performs something harmful to the computer it runs in
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
38
Names not on a DNS blacklist get filtered out,and those messages are not received.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
39
E-mail traffic is sent in plaintext by default and can be read easily by anyone who intercepts it.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
40
A(n)_______________ is a mail server that will accept mail from everyone.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
41
What are two possible solutions to security threats caused by viruses?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
42
Briefly give two examples of how hoax e-mails work.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
43
What is a basic description of a Trojan horse?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
44
Explain some of the problems with PGP.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
45
What is the best way to deal with e-mail hoax?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
46
Explain some of the problems with S/MIME's implementation.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
47
Define spam.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 47 flashcards in this deck.