Most instant messaging programs natively support encryption.
Securing e-mail is
something that must be done by
- Networking administrators
- Security administrators
- Outlook express
- Users
·
Users
What was the primary
reason for the spread of the ILOVEYOU worm.
- Network firewalls failed.
- Systems did not have the appropriate software patch.
- Automatic execution such as Microsoft Outlook's preview pane.
- Virus scan software was not updated.
·
Automatic execution
such as Microsoft Outlook's preview pane
One of the steps that
the majority of system administrators running Internet e-mail servers have
taken to reduce spam is to shut down ________.
- spam filters
- mail relaying
- e-mail attachments
- Outlook Express
·
mail relaying
The two main places to
filter spam are ________________.
- at the host itself and the server
- the firewall and the LAN
- the proxy server and the LAN
- the host and the firewall
·
at the host itself and
the server
A worm is a type of
virus that ____________.
- is scripted to send itself to other systems
- is designed to crawl in under a firewall
- buries itself between the kernel and the application layer of the operating
system
- is passed through e-mails with a subject heading that has the word
"worm" in it
·
is scripted to send
itself to other systems
Which of the following
is NOT one of the three primary e-mail protocols?
- SMTP
- SNMP
- POP3
- IMAP
·
SNMP
Which TCP port does
POP3 use?
- 25
- 110
- 143
- 443
·
110
What TCP port does
SMTP use?
- 25
- 110
- 143
- 443
·
25
Question 9
4 / 4 pts
<p>What TCP port does IMAP use?</p>
What TCP port does IMAP use?
- 110
- 25
- 143
- 443
·
143
Malicious code that is
scripted to send itself to other users is known as a ________.
- virus
- worm
- Trojan
- logic bomb
·
worm
A type of malicious
code that appears to be a safe program but that actually has a hidden purpose
is called a ____________.
vvirus
- hoax
- Trojan
- worm
·
Trojan
SubSeven and Back
Orifice are examples of what kinds of malicious code?
- Virus
- Hoax
- Worm
- Trojan
·
Trojan
The Kurt Vonnegut
commencement speech, the Neiman-Marcus Chocolate Chip Cookie Recipe, and the
get-well e-mails to the dying boy are examples of __________.
- social engineering
- hoax e-mails
- e-mail viruses
- worms
·
hoax e-mails
Unsolicited commercial
e-mail is known as __________.
- hoax e-mail
- worm
- spam
- spork
·
spam
One of the ways spam
is able to propagate is by taking advantage of servers that will accept e-mail
from anyone; these are known as ___________.
- open servers
- server relays
- open relays
- relay servers
·
open relays
Two tools that can be
used to encrypt e-mail are ___________________.
- MIME/S and PGP
- PGP and S/MIME
- PSP and MIME/S
- PGP and SIME
·
PGP and S/MIME
PGP uses
_______________ encryption.
- symmetric
- asymmetric
- shared key
- elliptical
·
asymmetric
The first instant
messaging program was ___________.
- AOL Instant Messenger
- Yahoo Instant Messenger
- MSN Instant Messenger
- Linux Instant Messenger
·
AOL Instant Messenger
One of the largest
security problems with IM programs is ___________.
- their inability to share files
- the lack of support for encryption
- the lack of support for video
- the lack of support for hiding online presence
·
the lack of support
for encryption
.
All of the following
techniques help to secure IM communications EXCEPT which of the following?
- Running a corporate IM server
- Using a different user name
- Avoiding file transfers
- Using encryption
·
Using a different user
name
Viruses started as
simple self-replicating program that spread via the transfer of floppy disks.
True or False
·
True
The trends show that
e-mail hoaxes are being thwarted due to new technology.
True or False
·
False
SMTP uses TCP port
110.
True or False
·
False
Viruses can exist
independent of a file, whereas worms require a file to infect.
True or False
·
False
Hoax e-mails can have
a real impact on bandwidth and productivity due to the distraction that can be
caused by them.
True or False
·
True
Unsolicited commercial
e-mail is referred to as a hoax e-mail.
True or False
·
False
Names not on a DNS blacklist
get filtered out, and those messages are not received.
True or False
·
False
E-mail traffic is sent
in plaintext by default and can be read easily by anyone who intercepts it.
True or False
·
True
S/MIME is a secure
implementation of the MIME protocol.
True or False.
·
True
Most instant messaging
programs natively support encryption.
True or False
·
False