Deck 14: Mail Vulnerabilities

Full screen (f)
exit full mode
Question
SMTP, IMAP, and POP are the main protocols supporting e-mail systems all over the world.
Use Space or
up arrow
down arrow
to flip the card.
Question
Most corporate mail servers allow third-party mail relaying.
Question
An e-mail message stored on an IMAP server can be modified from any remote location with access to Internet.
Question
Attackers can disrupt network services, spread viruses, and deny service to network users by exploiting the vulnerabilities of e-mail.
Question
Firefox is a browser that is free of bugs, coding errors, or vulnerabilities.
Question
A ____ entry permits hackers to take complete control of a mail system.

A)buffer
B)backdoor
C)queue
D)spool
Question
The Morris worm created chaos on the Internet in 1988 by spreading through the ____ program.

A)telnet
B)Eudora
C)sendmail
D)pine
Question
____ allows users to access e-mail messages that remain on the mail server.

A)SMTP
B)SNMP
C)POP3
D)IMAP
Question
____, as a technique, is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.

A)List linking
B)Phishing
C)E-mail spoofing
D)419
Question
____ are used by programs on the Internet (remote) and on a user's computer (local) to confirm the user's identity to any third party concerned.

A)Symmetric keys
B)Symmetric encryption algorithms
C)Digital signatures
D)SMTP and IMAP
Question
___________________________________ is the method used to transfer e-mail messages from one server to another or from a client computer to a server.
Question
____________________ is the practice of sending an identical e-mail repeatedly to the target user.
Question
____________________ is commercial or nuisance e-mail with no effective opt-out system.
Question
____________________ is a way of tampering with e-mail so that the message received appears to be from a known and trusted person,when it is actually sent by an impostor.
Question
____________________ uses e-mails from a purported financial institution (often eBay or Paypal) stating that there is something wrong with an account, and the account holder needs to log in to set it straight.
Question
How can an SMTP server be exploited?
Question
Describe the main characteristics of buffer overflow attacks for SMTP servers.
Question
What are the functions of IMAP?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Mail Vulnerabilities
1
SMTP, IMAP, and POP are the main protocols supporting e-mail systems all over the world.
True
2
Most corporate mail servers allow third-party mail relaying.
False
3
An e-mail message stored on an IMAP server can be modified from any remote location with access to Internet.
True
4
Attackers can disrupt network services, spread viruses, and deny service to network users by exploiting the vulnerabilities of e-mail.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
Firefox is a browser that is free of bugs, coding errors, or vulnerabilities.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ entry permits hackers to take complete control of a mail system.

A)buffer
B)backdoor
C)queue
D)spool
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
The Morris worm created chaos on the Internet in 1988 by spreading through the ____ program.

A)telnet
B)Eudora
C)sendmail
D)pine
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
____ allows users to access e-mail messages that remain on the mail server.

A)SMTP
B)SNMP
C)POP3
D)IMAP
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
____, as a technique, is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.

A)List linking
B)Phishing
C)E-mail spoofing
D)419
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
____ are used by programs on the Internet (remote) and on a user's computer (local) to confirm the user's identity to any third party concerned.

A)Symmetric keys
B)Symmetric encryption algorithms
C)Digital signatures
D)SMTP and IMAP
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
___________________________________ is the method used to transfer e-mail messages from one server to another or from a client computer to a server.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ is the practice of sending an identical e-mail repeatedly to the target user.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
____________________ is commercial or nuisance e-mail with no effective opt-out system.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
____________________ is a way of tampering with e-mail so that the message received appears to be from a known and trusted person,when it is actually sent by an impostor.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
____________________ uses e-mails from a purported financial institution (often eBay or Paypal) stating that there is something wrong with an account, and the account holder needs to log in to set it straight.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
How can an SMTP server be exploited?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
Describe the main characteristics of buffer overflow attacks for SMTP servers.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
What are the functions of IMAP?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.