Deck 14: Mail Vulnerabilities
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
Play
Full screen (f)
Deck 14: Mail Vulnerabilities
1
SMTP, IMAP, and POP are the main protocols supporting e-mail systems all over the world.
True
2
Most corporate mail servers allow third-party mail relaying.
False
3
An e-mail message stored on an IMAP server can be modified from any remote location with access to Internet.
True
4
Attackers can disrupt network services, spread viruses, and deny service to network users by exploiting the vulnerabilities of e-mail.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
Firefox is a browser that is free of bugs, coding errors, or vulnerabilities.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ entry permits hackers to take complete control of a mail system.
A)buffer
B)backdoor
C)queue
D)spool
A)buffer
B)backdoor
C)queue
D)spool
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
The Morris worm created chaos on the Internet in 1988 by spreading through the ____ program.
A)telnet
B)Eudora
C)sendmail
D)pine
A)telnet
B)Eudora
C)sendmail
D)pine
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
____ allows users to access e-mail messages that remain on the mail server.
A)SMTP
B)SNMP
C)POP3
D)IMAP
A)SMTP
B)SNMP
C)POP3
D)IMAP
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
____, as a technique, is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.
A)List linking
B)Phishing
C)E-mail spoofing
D)419
A)List linking
B)Phishing
C)E-mail spoofing
D)419
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
____ are used by programs on the Internet (remote) and on a user's computer (local) to confirm the user's identity to any third party concerned.
A)Symmetric keys
B)Symmetric encryption algorithms
C)Digital signatures
D)SMTP and IMAP
A)Symmetric keys
B)Symmetric encryption algorithms
C)Digital signatures
D)SMTP and IMAP
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
___________________________________ is the method used to transfer e-mail messages from one server to another or from a client computer to a server.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ is the practice of sending an identical e-mail repeatedly to the target user.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
____________________ is commercial or nuisance e-mail with no effective opt-out system.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
____________________ is a way of tampering with e-mail so that the message received appears to be from a known and trusted person,when it is actually sent by an impostor.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
____________________ uses e-mails from a purported financial institution (often eBay or Paypal) stating that there is something wrong with an account, and the account holder needs to log in to set it straight.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
How can an SMTP server be exploited?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
Describe the main characteristics of buffer overflow attacks for SMTP servers.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
What are the functions of IMAP?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck