Chapter 17
All mail servers support spam URI Real-time Block Lists (SURBLs) technology. True/False
False
Viruses can exist independent of a file, whereas worms require a file to infect. True/False
False
When Secure FTP (SFTP) is used for confidential data transfer, what protocol is combined with FTP to accomplish this task?
Secure Shell (SSH)
What term is used for unsolicited commercial e-mail?
Spam
What is the goal of TCP?
TCPs send an unauthenticated, error-free stream of information between two computers.
E-mail security is ultimately the responsibility of ________.
Users themselves
________ is essentially noting which domains and source addresses have a reputation for sending spam, and rejecting messages coming from those domains and source addresses.
Blacklisting
S/MIME is a secure implementation of the MIME protocol specification. True/False
True
One of the steps that the majority of system administrators running Internet e-mail servers have taken to reduce spam is to shut down ________.
Mail relaying
In technical terms, the application on the e-mail sender's machine is referred to as a ________.
Mail user Agent (MUA)
Which statement describes the primary purpose of JavaScript?
The primary purpose of JavaScript is to enable features such as validation of forms before they are submitted to the server.
Hoaxes are similar to chain letters, but instead of promising a reward, the story in the e-mail is typically what produces the action. True/False
True
All versions of SSL have been shown to be vulnerable to breach. True/False
True
Because FTP servers can present a security risk, they are typically not permitted on workstations and are disabled on servers without need for this functionality. True/False
True
