CIS 2337 HW 12 Study Notes
All mail servers support spam URI Real-time Block Lists (SURBLs) technology.
False
Sender Policy Framework (SPF) validates the receiving address of the e-mail.
False
Viruses can exist independent of a file, whereas worms require a file to infect.
False
When Secure FTP (SFTP) is used for confidential data transfer, what protocol is combined with FTP to accomplish this task?
Secure Shell (SSH)
The bane of users and system administrators everywhere, ____________________ is essentially unsolicited or undesired bulk electronic messages.
Spam
What term is used for unsolicited commercial e-mail?
Spam
Which port does HTTP traffic travel over by default?
TCP port 80
What is the goal of TCP?
TCPs send an unauthenticated, error-free stream of information between two computers.
E-mail security is ultimately the responsibility of __________.
Users themselves
S/MIME uses the X.509 format for certificates.
True
When active content was designed for the Web, in the form of Java and ____________________ scripts, these scripts were interpreted and run by the web browser.
ActiveX
In the case of an FTP server, which account allows unlimited public access to the files and is commonly used when you want to have unlimited distribution?
Anonymous
__________ is essentially noting which domains and source addresses have a reputation for sending spam, and rejecting messages coming from those domains and source addresses.
Blacklisting
Most e-mail is sent in plaintext, providing no privacy in its default form.
True
A(n) ____________________ is a mail server that will accept mail from anyone.
Open relay
S/MIME is a secure implementation of the MIME protocol specification.
True
There are entire ____________________ whose sole purpose is to spread spam for criminals, such as Kraken and Conficker.
Botnets
One of the steps that the majority of system administrators running Internet e-mail servers have taken to reduce spam is to shut down __________.
Mail relaying
In technical terms, the application on the e-mail sender's machine is referred to as a __________.
Mail user agent (MUA)
Server-based and desktop-based virus protection can help against ____________________ code, and spam filters attempt to block all unsolicited commercial e-mail.
Malicious
Which statement describes the primary purpose of JavaScript?
The primary purpose of JavaScript is to enable features such as validation of forms before they are submitted to the server.
All versions of SSL have been shown to be vulnerable to breach.
True
Because FTP servers can present a security risk, they are typically not permitted on workstations and are disabled on servers without need for this functionality.
True
Hoax e-mails can impact bandwidth.
True
Hoaxes are similar to chain letters, but instead of promising a reward, the story in the e-mail is typically what produces the action.
True
