Filters
Question type

Study Flashcards

PGP uses _______________ encryption.


A) symmetric
B) asymmetric
C) shared key
D) elliptical

Correct Answer

verifed

verified

SMTP uses TCP port 110.

Correct Answer

verifed

verified

Unsolicited commercial e-mail is known as __________.


A) hoax e-mail
B) worm
C) spam
D) spork

Correct Answer

verifed

verified

Unsolicited commercial e-mail is referred to as a hoax e-mail.

Correct Answer

verifed

verified

_______________ and _______________ are two very popular methods of encrypting e-mail.

Correct Answer

verifed

verified

All of the following techniques help to secure IM communications EXCEPT which of the following?


A) Running a corporate IM server
B) Using a different user name
C) Avoiding file transfers
D) Using encryption

Correct Answer

verifed

verified

Briefly give two examples of how hoax e-mails work.

Correct Answer

verifed

verified

1)You receive an e-mail tellin...

View Answer

Viruses can exist independent of a file,whereas worms require a file to infect.

Correct Answer

verifed

verified

_______________ is the method by which mail is sent to the server as well as from server to server.

Correct Answer

verifed

verified

Simple Mai...

View Answer

Malicious code that is scripted to send itself to other users is known as a ________.


A) virus
B) worm
C) Trojan
D) logic bomb

Correct Answer

verifed

verified

A(n)_______________ program appears to be safe,but actually has a sinister hidden purpose.

Correct Answer

verifed

verified

Hoax e-mails can have a real impact on bandwidth and productivity due to the distraction that can be caused by them.

Correct Answer

verifed

verified

_______________ refers to an unsolicited commercial e-mail whose purpose is the same as the junk mails in a physical mailbox;it tries to persuade the recipient buy something.

Correct Answer

verifed

verified

Which of the following is NOT one of the three primary e-mail protocols?


A) SMTP
B) SNMP
C) P3OP
D) IMAP

Correct Answer

verifed

verified

What TCP port does IMAP use?


A) 110
B) 25
C) 143
D) 443

Correct Answer

verifed

verified

Explain some of the problems with PGP.

Correct Answer

verifed

verified

Diligence must be applied to k...

View Answer

The trends show that e-mail hoaxes are being thwarted due to new technology.

Correct Answer

verifed

verified

The _______________ was the first list to utilize the concept of using DNS records to filter or "blackhole" spam-sending IP addresses and domains.

Correct Answer

verifed

verified

Realtime B...

View Answer

The Kurt Vonnegut commencement speech,the Neiman-Marcus Chocolate Chip Cookie Recipe,and the get-well e-mails to the dying boy are examples of __________.


A) social engineering
B) hoax e-mails
C) e-mail viruses
D) worms

Correct Answer

verifed

verified

Most instant messaging programs natively support encryption.

Correct Answer

verifed

verified

Showing 21 - 40 of 47

Related Exams

Show Answer