Info Sec - Ch 16

¡Supera tus tareas y exámenes ahora con Quizwiz!

___ is one of the most popular chat programs.

AOL Instant Messenger (AIM)

What is one of the biggest reasons spam is prevalent today? A) Criminals use zombie botnets. B) Regular mail is too slow. C) Spam is popular among recipients. D) Spam is sent from the government.

Criminals use zombie botnets

___ is a method to detect e-mail spoofing.

DomainKeys Identified Mail (DKIM)

What is greylisting? A) E-mail messages are temporarily rejected so that the sender is forced to resend. B) E-mail messages are run through a strong set of filters before delivery. C) E-mail messages are sent through special secure servers. D) E-mail is sent directly from the local host to the remote host, bypassing servers entirely.

E-mail messages are temporarily rejected so that the sender is forced to resend

If they are both text protocols, why is instant messaging traffic riskier than e-mail? A) More viruses are coded for IM. B) IM has no business purpose. C) IM traffic has to travel outside of the organization to a server. D) Emoticons.

IM traffic has to travel outside of the organization to a server.

What makes spam so popular as an advertising medium? A) Its low cost per impression B) Its high rate of return C) Its ability to canvass multiple countries D) Its quality of workmanship

Its low cost per impression

___ is the protocol used to attach attachments to an email.

Multipurpose Internet Mail Extentions (MIME)

___ is a protocol for verifying e-mail addresses against IP addresses to reduce spam.

Sender IF Framework

The most prevalent protocol that e-mail is sent by is ___.

Simple Mail Transfer Protocol (SMTP)

Why are instant messaging protocols dangerous for file transfer? A) They bypass server-based virus protections. B) File sharing is never dangerous. C) They allow everyone you chat with to view all your files. D) You'll end up receiving many spam files.

They bypass server-based virus protections.

A large source of spam is zombie computers that are part of a(n) ___.

botnet

___ can have the same virus risks as e-mail.

instant messaging

Spam is the popular term for ___.

unsolicited commercial email

Why is HTML e-mail dangerous? A) It can't be read by some e-mail clients. B) It sends the content of your e-mails to web pages. C) It can allow launching of malicious code from the preview pane. D) It is the only way spam can be sent.

It can allow launching of malicious code from the preview pane.

Why is an open e-mail relay bad? A) It allows anyone to remotely control the server. B) It makes the e-mail server reboot once a day. C) No e-mail will go through. D) It will allow anyone to send spam through the server.

It will allow anyone to send spam through the server

A(n) ___ is a compilation of servers that are blocked because they have been known to send spam.

Real-time Blackhole List (RBL)

Why do PGP and S/MIME need public key cryptography? A) Public keys are necessary to determine whether the e-mail is encrypted. B) The public key is necessary to encrypt the symmetric key. C) The public key unlocks the password to the email. D) The public key is useless and gives a false sense of privacy.

The public key is necessary to encrypt the symmetric key.

What makes e-mail hoaxes popular enough to keep the same story floating around for years? A) They are written by award-winning authors. B) The story prompts action on the reader's part. C) The story will grant the user good luck only if he or she forwards it on. D) The hoax e-mail forwards itself.

The story prompts action on the reader's part

What is spam? A) Unsolicited commercial e-mail B) A Usenet archive C) A computer virus D) An encryption algorithm

Unsolicited commercial e-mail

A(n) ___ is a false e-mail that tells a compelling story, and typically prompts the user to forward it to other users.

e-mail hoax


Conjuntos de estudio relacionados

Anatomy and Physiology: Chapter 6 - Connect Assignment

View Set

Ch 10 Object-Oriented Programming: Polymorphism and Interfaces

View Set

Biostatistika Bagian II Teknik Estimasi dan Pengujian Hipotesis

View Set

Generative Design for Part Consolidation

View Set

Quiz 7 Information Security Fundamentals

View Set