Most instant messaging programs natively support encryption.

Most instant messaging programs natively support encryption.



Securing e-mail is something that must be done by
- Networking administrators
- Security administrators
- Outlook express
- Users

 

·         Users

 

What was the primary reason for the spread of the ILOVEYOU worm.
- Network firewalls failed.
- Systems did not have the appropriate software patch.
- Automatic execution such as Microsoft Outlook's preview pane.
- Virus scan software was not updated.

 

·         Automatic execution such as Microsoft Outlook's preview pane

 

One of the steps that the majority of system administrators running Internet e-mail servers have taken to reduce spam is to shut down ________.
- spam filters
- mail relaying
- e-mail attachments
- Outlook Express

 

·         mail relaying

 

The two main places to filter spam are ________________.
- at the host itself and the server
- the firewall and the LAN
- the proxy server and the LAN
- the host and the firewall

 

·         at the host itself and the server

 

A worm is a type of virus that ____________.
- is scripted to send itself to other systems
- is designed to crawl in under a firewall
- buries itself between the kernel and the application layer of the operating system
- is passed through e-mails with a subject heading that has the word "worm" in it

 

·         is scripted to send itself to other systems

 

Which of the following is NOT one of the three primary e-mail protocols?
- SMTP
- SNMP
- POP3
- IMAP

 

·         SNMP

 

Which TCP port does POP3 use?
- 25
- 110
- 143
- 443

 

·         110

 

What TCP port does SMTP use?
- 25
- 110
- 143
- 443

 

·         25

 

Question 9
4 / 4 pts
<p>What TCP port does IMAP use?</p>
What TCP port does IMAP use?
- 110
- 25
- 143
- 443

 

·         143

 

Malicious code that is scripted to send itself to other users is known as a ________.
- virus
- worm
- Trojan
- logic bomb

 

·         worm

 

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a ____________.
vvirus
- hoax
- Trojan
- worm

 

·         Trojan

 

SubSeven and Back Orifice are examples of what kinds of malicious code?
- Virus
- Hoax
- Worm
- Trojan

 

·         Trojan

 

The Kurt Vonnegut commencement speech, the Neiman-Marcus Chocolate Chip Cookie Recipe, and the get-well e-mails to the dying boy are examples of __________.
- social engineering
- hoax e-mails
- e-mail viruses
- worms

 

·         hoax e-mails

 

Unsolicited commercial e-mail is known as __________.
- hoax e-mail
- worm
- spam
- spork

 

·         spam

 

One of the ways spam is able to propagate is by taking advantage of servers that will accept e-mail from anyone; these are known as ___________.
- open servers
- server relays
- open relays
- relay servers

 

·         open relays

 

Two tools that can be used to encrypt e-mail are ___________________.
- MIME/S and PGP
- PGP and S/MIME
- PSP and MIME/S
- PGP and SIME

 

·         PGP and S/MIME

 

PGP uses _______________ encryption.
- symmetric
- asymmetric
- shared key
- elliptical

 

·         asymmetric

 

The first instant messaging program was ___________.
- AOL Instant Messenger
- Yahoo Instant Messenger
- MSN Instant Messenger
- Linux Instant Messenger

 

·         AOL Instant Messenger

 

One of the largest security problems with IM programs is ___________.
- their inability to share files
- the lack of support for encryption
- the lack of support for video
- the lack of support for hiding online presence

 

·         the lack of support for encryption

.

All of the following techniques help to secure IM communications EXCEPT which of the following?
- Running a corporate IM server
- Using a different user name
- Avoiding file transfers
- Using encryption

 

·         Using a different user name

 

Viruses started as simple self-replicating program that spread via the transfer of floppy disks.
True or False

 

·         True

 

The trends show that e-mail hoaxes are being thwarted due to new technology.
True or False

 

·         False

 

SMTP uses TCP port 110.
True or False

 

·         False

 

Viruses can exist independent of a file, whereas worms require a file to infect.
True or False

 

·         False

 

Hoax e-mails can have a real impact on bandwidth and productivity due to the distraction that can be caused by them.
True or False

 

·         True

 

Unsolicited commercial e-mail is referred to as a hoax e-mail.
True or False

 

·         False

 

Names not on a DNS blacklist get filtered out, and those messages are not received.
True or False

 

·         False

 

E-mail traffic is sent in plaintext by default and can be read easily by anyone who intercepts it.
True or False

 

·         True

 

S/MIME is a secure implementation of the MIME protocol.
True or False.

 

·         True

 

Most instant messaging programs natively support encryption.
True or False

 

·         False

 

 

Answer Detail

Get This Answer

Invite Tutor