CIS 2337 HW 12 Study Notes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

All mail servers support spam URI Real-time Block Lists (SURBLs) technology.

False

Sender Policy Framework (SPF) validates the receiving address of the e-mail.

False

Viruses can exist independent of a file, whereas worms require a file to infect.

False

When Secure FTP (SFTP) is used for confidential data transfer, what protocol is combined with FTP to accomplish this task?

Secure Shell (SSH)

The bane of users and system administrators everywhere, ____________________ is essentially unsolicited or undesired bulk electronic messages.

Spam

What term is used for unsolicited commercial e-mail?

Spam

Which port does HTTP traffic travel over by default?

TCP port 80

What is the goal of TCP?

TCPs send an unauthenticated, error-free stream of information between two computers.

E-mail security is ultimately the responsibility of __________.

Users themselves

S/MIME uses the X.509 format for certificates.

True

When active content was designed for the Web, in the form of Java and ____________________ scripts, these scripts were interpreted and run by the web browser.

ActiveX

In the case of an FTP server, which account allows unlimited public access to the files and is commonly used when you want to have unlimited distribution?

Anonymous

__________ is essentially noting which domains and source addresses have a reputation for sending spam, and rejecting messages coming from those domains and source addresses.

Blacklisting

Most e-mail is sent in plaintext, providing no privacy in its default form.

True

A(n) ____________________ is a mail server that will accept mail from anyone.

Open relay

S/MIME is a secure implementation of the MIME protocol specification.

True

There are entire ____________________ whose sole purpose is to spread spam for criminals, such as Kraken and Conficker.

Botnets

One of the steps that the majority of system administrators running Internet e-mail servers have taken to reduce spam is to shut down __________.

Mail relaying

In technical terms, the application on the e-mail sender's machine is referred to as a __________.

Mail user agent (MUA)

Server-based and desktop-based virus protection can help against ____________________ code, and spam filters attempt to block all unsolicited commercial e-mail.

Malicious

Which statement describes the primary purpose of JavaScript?

The primary purpose of JavaScript is to enable features such as validation of forms before they are submitted to the server.

All versions of SSL have been shown to be vulnerable to breach.

True

Because FTP servers can present a security risk, they are typically not permitted on workstations and are disabled on servers without need for this functionality.

True

Hoax e-mails can impact bandwidth.

True

Hoaxes are similar to chain letters, but instead of promising a reward, the story in the e-mail is typically what produces the action.

True


Ensembles d'études connexes

Ch 11 - Technology, Production, & Costs

View Set

High Modernism in Asia and National Capitals

View Set

Chapter 6 - Cell Communication & Cell Cycle

View Set

Lowdermilk 11th Ed. Chapter 31: Mental Health Disorders and Substance Abuse

View Set