CIW Quiz 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following devices can you use with personal information management (PIM) software to synchronize appointments and contact information that you keep on your desktop or laptop computer?

A smartphone

Question 3 : In which of the following components should you store names and information for your frequently accessed e-mail contacts?

Address book

How do most current e-mail clients display an attachment in an e-mail message?

As a separate link, such as an icon

What symbol does an e-mail address use to separate the user name from the domain?

At ( @ )

Question 5 : If your organization scans e-mail attachments to ensure that they contain no malicious code, where does the scanning take place?

At the e-mail server

What is the term for a file that is sent with an e-mail message?

Attachment

Which of the following can administrators use to filter out the IP addresses of known spammers?

Blackhole list

Which of the following can be used to detect automated systems used by spammers for registering e-mail accounts?

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

Question 18 : Which of the following is an appropriate use of e-mail in a business environment?

Discussing the status of a project with co-workers

What part of an e-mail address appears after the @ symbol?

Domain name

Which of the following e-mail response options should you use to send an e-mail message to users who did not receive the original?

Forward

Question 11 : Which of the following is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?

GNU Privacy Guard (GPG)

Which of the following enables users on different e-mail systems to exchange messages?

Gateways

Why is having local access to e-mail messages important for those who use IMAP servers?

If a network problem occurs, IMAP server users may not have access to their messages.

What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?

Mail Delivery Agent (MDA)

What is the term for an SMTP server that allows the third-party relay of e-mail messages that spammers use to send spam?

Open relay

Which of the following is known as a "store-and-forward" e-mail service?

Post Office Protocol version 3 (POP3)

Which of the following e-mail response options should you use to respond only to the original sender of an e-mail message?

Reply

Which of the following protocols support the encryption and decryption of e-mail messages?

Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)

Which of the following client-side actions can you take to reduce the amount of spam you receive?

Set up a spam filter in your e-mail client to filter out spam messages.

The commonplace use of e-mail has given rise to the term "snail mail," which is a slang term for what?

Standard postal service

When you receive an e-mail transmission with an attachment, how does your browser know which application or plug-in to open to view or play the attachment?

The MIME definition for the application or plug-in that is located inside the HTTP header at the beginning of the transmission.

What must an e-mail message recipient possess in order to view a file attachment?

The software necessary to open or edit the attached file

Which of the following can be considered a drawback of SMTP authentication?

There is a greater chance that a hacker can use a packet sniffer to obtain a valid user name and password.

Question 15 : Why should you use out-of-office messages when you will be out of the office for an extended period of time?

To explain why you may not respond to e-mail messages within a reasonably short period of time

For what would you use a personal information management (PIM) program?

To schedule appointments and meetings, store contact information, and manage tasks

Question 10 : Which of the following can be considered an advantage of Web-based e-mail?

You can log on and check your e-mail from any computer that has Internet access.

Which of the following is a disadvantage of using Web-based e-mail?

Your user name and password reside on a third-party server.

Question 16 : In order to send an e-mail message, you must include:

an address in the To field.

The term "netiquette" refers to:

general rules for Internet politeness.

When you use an e-mail client to send and receive mail:

messages stored in your Outbox are sent, a copy of each sent message is stored in the Sent Items folder, and incoming messages are routed to your Inbox.

Using all capital letters in an e-mail message connotes:

shouting or anger.

By default, e-mail clients typically save a copy of every message you send in:

the Sent or Sent Items folder.

E-mail message headers consist of:

the To, Cc, Bcc, Subject and Attachment components.


Ensembles d'études connexes

Mississippi Real Estate License Law

View Set

Pharmacology ATI study questions Part 2

View Set

Intro to Psychology Midterm Study

View Set

how many/much , a few/a little/a lot

View Set

Ch 2 Review Questions - Linux Installation and Usage

View Set