Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Networking
Q:
The NIC is a device, in the form of a card, that enables a computer or network equipment to attach to the network. _________________________
Q:
In the command "ups_aio msgdelay=300 downtime=600" a power outage warning is sent to all users within 10 minutes of a power outage. _________________________
Q:
An online UPS connects city power directly to the electrical equipment until it senses a sudden reduction in power, at which time it switches over to batteries. _________________________
Q:
Windows 2000 Server and Windows Server 2003 support only RAID levels 0, 1, and 5 for disk fault tolerance.
Q:
RAID is a set of standards for lengthening disk life and preventing data loss.
Q:
With disk striping, there are two separate drives for each disk volume of data.
Q:
DFS is configured using the Distributed File System tool in the Administrative Tools menu in Windows 2000 Server.
Q:
Windows 2000 Server, Windows Server 2003, Red Hat Linux 9.x, and NetWare 6.x all have versions or add-on software to enable clustering.
Q:
Windows 2000, Windows XP Professional, Windows Server 2003, Red Hat Linux 9.x, Mac OS X, and NetWare 6.x all support multiprocessor systems.
Q:
In Netware, the AIOCOMX NLM is the software used to configure the communications parameters for a UPS.
Q:
Red Hat Linux 9.x supports the implementation of a UPS through the use of the /sbin/powerd utility.
Q:
An online UPS normally regulates power to provide insurance for brownouts as well as outages.
Q:
There are two types of UPS systems that are commonly marketed: onsite and offsite.
Q:
When using only SMTP, no line can be longer than 1000 characters.
Q:
Authenticating e-mail is one of the most effective ways to ensure the privacy of messages while they are in transit and after they arrive at an SMTP server.
Q:
One way to help control UCE is for an organization to ensure that its mail servers are not configured as open SMTP relay servers.
Q:
A local delivery agent is used to transmit an e-mail message.
Q:
A common way to attack SMTP is an indirect attack through a DNS server.
Q:
When e-mail is accessed on an e-mail server using POP3, only the message headers are initially downloaded to the client.
Q:
POP3 is popular among many ISPs because it is designed so that messages are downloaded to an inbox on the client's computer, rather than being stored on the e-mail server after they are accessed.
Q:
MIME is designed for the exchange of electronic mail between networked systems, particularly via the Internet.
Q:
List five pieces of information that an SMTP address header may contain.
Q:
What four authentication methods can Apple Mail use for verifying access to an e-mail account?
Q:
List five of the e-mail security features that are offered through Microsoft Outlook.
Q:
List four of the e-mail communication security measures that are supported by Outlook Express.
Q:
List four popular e-mail tools that are in use today.
Q:
List five ways users can protect themselves from malicious e-mail attachments.
Q:
If an organization decides to use an e-mail gateway with virus scanning software, what four features should they look for in the software?
Q:
What are three e-mail security measures that organizations can take to protect its users and computers?
Q:
What six pieces of information are contained in a PGP digital certificate?
Q:
Match the following terms to the appropriate definition.a. GPG f. POPb. Host address (A) resource record g. PGPc. Host address (AAAA) resource record h. PKCSd. Open SMTP relay server i. S/MIMEe. PTR resource record j. SRV locator record1/ Consists of a computer or domain name mapped to a 128-bit address2/ Consists of an IP address correlated to a computer or domain name3/ Standards developed by RSA Laboratories and other security organizations for public-key security methods4/ A DNS server record that associates a particular TCP/IP service to a server5/ Consists of a computer or domain name correlated to a 32-bit address6/ E-mail security method sometimes preferred by the open systems community7/ An e-mail server that resends e-mail to other servers without restrictions8/ An encryption and certificate-based security technique for e-mail messages9/ Gives an SMTP server the ability to receive and store e-mail10/ A security method that is designed to be compatible with PGP
Q:
In 1998, 40-bit and 56-bit DES encryption techniques were added to ____________________.
Q:
E-mail encryption reduces the chance that someone can forge an e-mail, because both the sender and the recipient must be using the same encryption ____________________ and the same encryption method.
Q:
When an e-mail message is sent, a(n) ____________________ is used to place a new message into a particular user's mailbox.
Q:
Sending a malicious SMTP message from a UNIX/Linux operating system is easier, because the attacker simply uses e-mail ____________________ options already built into UNIX/Linux.
Q:
When a computer sends e-mail, the message goes to a(n) ____________________ server that looks up the SMTP server on its network and enables the message to be directed to that server.
Q:
When using IMAP, the ____________________ command chooses a folder from which to determine the available messages.
Q:
Using POP3 can be a disadvantage for ____________________, because messages are not previewed before they are downloaded.
Q:
An SMTP address header ____________________ contains the source and destination e-mail addresses.
Q:
POP and IMAP are designed to enable ____________________ and retrieval of e-mail messages.
Q:
SMTP does not require use of a(n) ____________________ and password for the remote system.
Q:
Does all software that sends e-mail through the Internet use SMTP?
Q:
Does POP work through TCP port 109 for POP2 to enable an SMTP server to receive, store, and allow clients to retrieve their messages?
Q:
In an SMTP message, are the address header and the message text both encoded in 15-bit ASCII format?
Q:
Is IDEA well respected as a very secure patented block cipher encryption method?
Q:
Does PGP security rely strictly on the use of X.509 digital certificates?
Q:
Does SMTP support the transmission of ASCII text as well as binary file?
Q:
Is unsolicited commercial e-mail very expensive for organizations?
Q:
Do direct attacks on SMTP typically come from client e-mail software such as Outlook, Evolution, or Apple Mail?
Q:
Does a DNS server convert a computer or domain name to an IP address, or an IP address to a computer or domain name, in a process called resolution?
Q:
Is the goal of SMTP to provide reliable and guaranteed message transport?
Q:
What is displayed in the figure above?a. Evolution Mail Summary view b. Apple Mail c. Outlook Expressd. Eudora
Q:
What is displayed in the figure above?a. Outlook Express b. Apple Mail c. Evolution Mail configuration optionsd. Evolution Mail Summary view
Q:
In the figure above, where is an attacker most likely to attempt to intercept e-mail transmissions?a. Between A and B b. Between B and C c. Between C and Dd. At D
Q:
Which of the following encryption methods are supported by GPG?a. Twofish b. Blowfish c. IDEAd. Both a and be. Both b and c
Q:
In Microsoft Outlook, into which file types can you import messages?a. Text file b. Microsoft Access file c. Microsoft Word filed. Both a and be. Both b and c
Q:
Which of the following e-mail security features offered by Microsoft Outlook are proprietary to Microsoft exchange?
a. V1 Exchange Server Security certificates
b. X2 Exchange Server Security certificates
c. Digital signatures encrypted using the Security Hash Algorithm 1
d. 168-bit Exchange Server mail encryption services
Q:
What is the name of the e-mail tools used in Mac OS X?a. Ximian b. Pine c. MailXd. Mail
Q:
In PGP, what CAST variable key length is available?a. 32 bits b. 56 bits c. 128 bitsd. Both a and be. Both b and c
Q:
In 2002, which type of security was added to S/MIME?a. 40-bit DES b. 56-bit DES c. 128-bit key triple DESd. 168-bit key triple DES
Q:
Which of the following is an example of a Commercial CA?a. GCFNb. GTE CyberTrust c. Thawted. All of the above
Q:
What is the maximum length of a message line when using SMTP only?a. 100 characters b. 256 characters c. 500 charactersd. 1000 characters
Q:
What type of encoding is used with MIME?a. Base16 b. Base32 c. Base64d. Base128
Q:
_____ provides extensions to the original SMTP address header information so that many different types of message content can be encoded for transport over the Internet.a. MIME b. POP3 c. PGPd. PPL
Q:
Which of the following e-mail encryption method is recommended by many security professionals?a. S/MIME b. PGP c. MIMEd. Both a and be. Both b and c
Q:
Which of the following is unrequested e-mail that is sent to hundreds, thousands, or even millions of users?a. USE b. Spam c. Trashd. Crud
Q:
When an e-mail message is sent, what type of program is used to transmit the e-mail message?a. Message transmission agent b. Message transfer agent c. Local delivery agentd. Mail user agent
Q:
When an e-mail message is sent, what type of program is used to place a new message into a particular user's mailbox?a. Message transfer agent b. Mail user agent c. Local delivery agentd. Message placement agent
Q:
When an e-mail message is sent, what type of program is used to compose and read an e-mail message?a. Mail user agent b. Message transfer agent c. Local delivery agentd. Mail reader agent
Q:
What command does an attacker use to send the contents of a malicious file into the port-scanning software, directing the port scanner to send it to the target SMTP server on port 25?a. send b. post c. grepd. pipe
Q:
A _____ associates a particular TCP/IP service to a server along with the domain of the server and its protocol.a. pointer resource record b. host address resource record c. service locator recordd. server locator record
Q:
To look up a computer name on the basis of its IP address, a DNS _____is configured on the DNS server.a. location resource record b. host address resource record c. service locator recordd. pointer resource record
Q:
Looking up a computer on the basis of its name and then associating that name with an IP address is accomplished by defining a DNS _____.a. host address resource recordb. service locator record c. pointer resource recordd. location resource record
Q:
What is the most current version of IMAP?a. 2 b. 3 c. 4d. 5
Q:
What TCP port does IMAP use?a. 25 b. 109 c. 110d. 143
Q:
Which protocol enables e-mail to be received and stored on an SMTP server and allows clients to obtain their messages?a. MIME b. S/MIME c. X.400d. IMAP
Q:
Which TCP port is used for POP2?a. 23 b. 109 c. 110d. 125
Q:
Which TCP port is used for POP3?a. 25 b. 100 c. 109d. 110
Q:
Which of the following information is contained in an SMTP message header?a. To:b. From:c. Date:d. Subject:e. All of the above
Q:
In an SMTP address header, the _____ is the name of the SMTP post office server used to transmit and receive the e-mail.a. domain nameb. server name c. host named. post office name