Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
_____ provides extensions to the original SMTP address header information so that many different types of message content can be encoded for transport over the Internet.a. MIME b. POP3 c. PGPd. PPL
Q:
Which of the following e-mail encryption method is recommended by many security professionals?a. S/MIME b. PGP c. MIMEd. Both a and be. Both b and c
Q:
Which of the following is unrequested e-mail that is sent to hundreds, thousands, or even millions of users?a. USE b. Spam c. Trashd. Crud
Q:
When an e-mail message is sent, what type of program is used to transmit the e-mail message?a. Message transmission agent b. Message transfer agent c. Local delivery agentd. Mail user agent
Q:
When an e-mail message is sent, what type of program is used to place a new message into a particular user's mailbox?a. Message transfer agent b. Mail user agent c. Local delivery agentd. Message placement agent
Q:
When an e-mail message is sent, what type of program is used to compose and read an e-mail message?a. Mail user agent b. Message transfer agent c. Local delivery agentd. Mail reader agent
Q:
What command does an attacker use to send the contents of a malicious file into the port-scanning software, directing the port scanner to send it to the target SMTP server on port 25?a. send b. post c. grepd. pipe
Q:
A _____ associates a particular TCP/IP service to a server along with the domain of the server and its protocol.a. pointer resource record b. host address resource record c. service locator recordd. server locator record
Q:
To look up a computer name on the basis of its IP address, a DNS _____is configured on the DNS server.a. location resource record b. host address resource record c. service locator recordd. pointer resource record
Q:
Looking up a computer on the basis of its name and then associating that name with an IP address is accomplished by defining a DNS _____.a. host address resource recordb. service locator record c. pointer resource recordd. location resource record
Q:
What is the most current version of IMAP?a. 2 b. 3 c. 4d. 5
Q:
What TCP port does IMAP use?a. 25 b. 109 c. 110d. 143
Q:
Which protocol enables e-mail to be received and stored on an SMTP server and allows clients to obtain their messages?a. MIME b. S/MIME c. X.400d. IMAP
Q:
Which TCP port is used for POP2?a. 23 b. 109 c. 110d. 125
Q:
Which TCP port is used for POP3?a. 25 b. 100 c. 109d. 110
Q:
Which of the following information is contained in an SMTP message header?a. To:b. From:c. Date:d. Subject:e. All of the above
Q:
In an SMTP address header, the _____ is the name of the SMTP post office server used to transmit and receive the e-mail.a. domain nameb. server name c. host named. post office name
Q:
In an SMTP address header, the _____ is the dotted-decimal address of the SMTP server.a. envelopeb. message header c. host namesd. domain literal
Q:
SMTP processes e-mail through a queue that serves as a _____ for users that connect to that server.
a. home base c. post office
b. resource center d. library
Q:
What type of encoding is used by SMTP?a. 7-bit ASCII b. 7-bit binary c. 11-bit ASCIId. 11-bit binary
Q:
How many parts does each SMTP message have?a. 1 b. 2 c. 3d. 4
Q:
Which of the following ports is required for a user to send e-mail via SMTP?a. 25 b. 23 c. 110d. 443
Q:
SMTP was proposed in _____ by Jon Postel and began, in part, as an alternative to FTP for sending a file from one computer system to another.a. 1972 b. 1982 c. 1992d. 2002
Q:
SMTP is a client and server process. _________________________
Q:
SMTP was proposed in 1982 by Jon Postel and began, in part, as an alternative to FTP for sending a file from one computer system to another. _________________________
Q:
Apple Mail uses PGP for security and enables you to specify use of SSL for security over Internet links to e-mail. _________________________
Q:
A valuable security feature of Apple Mail is that you can create rules to reject mail from unwanted or unknown sources. _________________________
Q:
GPG is a security method that is designed to be compatible with PGP. _________________________
Q:
CAST was developed by Xuejia Lai and James Massey and uses a 128-bit key. _________________________
Q:
PKCS is a proprietary encryption method developed by RSA Security as an alternative to DES. _________________________
Q:
The MIME extensions are provided to enable 8-bit binary encoding, and they enable the sending of multipart messages. _________________________
Q:
EBlock works with Microsoft's Internet Mail Service to create a list of sources from which to refuse e-mail. _________________________
Q:
A(n) host address resource record associates a particular TCP/IP service to a server. _________________________
Q:
PGP enables the use of X.509 or PGP digital certificates, which are essentially public keys given to the recipient of the e-mail communication.
Q:
In terms of encryption, the original S/MIME version used a 56-bit encryption method, called RC3.
Q:
List eight types of connections that are supported by a RAS server.
Q:
On which operating systems can Mozilla run?
Q:
What are the four default values for the security zones in the Internet Explorer Enhanced Security Configuration component in Windows Server 2003?
Q:
List 10 different security measures that can be configured for an Internet zone in Internet Explorer.
Q:
What four types of security zones does Internet Explorer allow you to configure?
Q:
Name three of the most popular Internet browsers.
Q:
What five types of data does CMS handle?
Q:
What are four features of HTTP/1.1?
Q:
Provide five examples of vital protocols and services that users employ every day on the Internet.
Q:
____________________ is an application that enables the transfer of data from one remote device to another, using the TCP protocol.
Q:
SSL uses ____________________ encryption, which employs asymmetrical public and private keys.
Q:
S-HTTP provides ____________________ security for HTTP-transported information, but it is only used by some vendors' applications.
Q:
______________________________ is a syntax for encapsulating information in an encrypted format.
Q:
The ________________________________________ server is used to provide authentication services for all RAS or VPN servers on a network, ensuring that a consistent remote access policy is used.
Q:
With ____________________ security set up, the server calls back the remote computer to verify its telephone number, in order to discourage an attacker from trying to access the server.
Q:
When you use a modem to connect to the Internet, you are also most likely using _________________________ for network communication.
Q:
One of the functions of a remote access protocol is to ____________________ a packet formatted for a network transport protocol, so that it can be transmitted from a point at one end of a WAN to another point.
Q:
In the ____________________ browser, security configuration is combined with privacy configuration options.
Q:
NFS security is handled through the /etc/hosts.allow and the /etc/hosts.____________________ files.
Q:
Does NFS send data in record streams instead of in bulk file streams?
Q:
Do Internet browsers such as Internet Explorer, Netscape, and Mozilla all enable you to configure SSL and certificate security?
Q:
Have Netscape and Microsoft implemented S-HTTP to protect data transported via their Web browsers?
Q:
Does HTTP enable the establishment of a connection, as well as provide for the exchange of resources?
Q:
Does the RAS "Strong" encryption option enable clients to use 56-bit IPSec, Triple DES, or MPPE 128-bit encryption?
Q:
Was CHAP developed especially for use with VPNs?
Q:
Are the permissions of a remote access policy a combination of those configured under the user account and the remote access policy?
Q:
Is IAS a protocol that a RAS or VPN server can use to defer a user's access request to a central RADIUS server?
Q:
In the Windows Server 2003 RAS, callback option "Set by Caller" is the phone number provided by the remote computer?
Q:
Does PPP use an additional network communications standard, called Layer Two Forwarding, that enables forwarding on the basis of MAC addressing, in addition to IP addressing?
Q:
What is displayed in the figure above?a. Internet Explorer security settings in Windows Server 2003b. Privacy & Security options in Mozillac. Privacy & Security options in Netscaped. Installing Internet Explorer Enhanced Security Configuration in Windows Server 2003
Q:
Which of the following protocols encapsulate PPP and create special tunnels over a public network such as the Internet that reflect intranets and VPNs?a. PPTP b. L2TP c. IPSecd. Both a and be. Both b and c
Q:
What is displayed in the figure above?a. Privacy & Security options in Mozillab. Privacy & Security options in Netscapec. Privacy & Security options in Internet Explorerd. None of the above
Q:
Which of the following are considered to be line devices?a. Modems b. ISDN adapters c. Fax cardsd. Only a and ce. a, b, and c
Q:
What is the maximum downstream transmission speed of DSL?a. 2.3 Mbps b. 6 Mbpsc. 60 Mbps d. 128 Mbps
Q:
What is the maximum upstream transmission speed of DSL?a. 1.2 Mbps b. 2.3 Mbps c. 6 Mbpsd. 60 Mbps
Q:
What was the maximum transmission speed of X.25 before being upgraded in 1992?a. 16 Kbps b. 24 Kbps c. 64 Kbpsd. 128 Kbps
Q:
What is the maximum transmission speed of X.25?a. 64 Kbpsb. 128 Kbps c. 1.024 Mbpsd. 2.048 Mbps
Q:
How many channels are used for data, voice, and graphics transmissions in an ISDN basic rate interface?a. 1 b. 2 c. 3d. 4
Q:
What is the size of the ISDN basic rate interface channel that is used for data, voice, and graphics transmissions?
a. 16 Kbps c. 56 Kbps
b. 24 Kbps d. 64 Kbps
Q:
What is the size of the ISDN basic rate interface channel that is used for communications signaling?a. 16 Kbps b. 24 Kbps c. 64 Kbpsd. 128 Kbps
Q:
ISDN basic rate interface consists of how many channels?a. 1 b. 2 c. 3d. 4
Q:
Which of the following operating systems can connect through RAS?a. MS-DOS b. Netwarec. Linuxd. Both a and b e. Both b and c
Q:
How many simultaneous RAS connections does Windows XP Professional allow?a. 1 b. 2 c. 10d. hundreds
Q:
Which GUI features are included in Netscape but not in Mozilla?a. Buddy listb. Mail c. Newsd. All features are identical
Q:
Which Mozilla security option manages the revocation of certificates and enables or disables the use of OCSP?a. SSL b. Certificates c. Validationd. Security