Security+ Chapter 16

Ace your homework & exams now with Quizwiz!

Which TCP port does POP3 use? - 25 - 110 - 143 - 443

110

Question 9 4 / 4 pts <p>What TCP port does IMAP use?</p> What TCP port does IMAP use? - 110 - 25 - 143 - 443

143

What TCP port does SMTP use? - 25 - 110 - 143 - 443

25

The first instant messaging program was ___________. - AOL Instant Messenger - Yahoo Instant Messenger - MSN Instant Messenger - Linux Instant Messenger

AOL Instant Messenger

Most instant messaging programs natively support encryption. True or False

False

Names not on a DNS blacklist get filtered out, and those messages are not received. True or False

False

SMTP uses TCP port 110. True or False

False

The trends show that e-mail hoaxes are being thwarted due to new technology. True or False

False

Unsolicited commercial e-mail is referred to as a hoax e-mail. True or False

False

Viruses can exist independent of a file, whereas worms require a file to infect. True or False

False

Which of the following is NOT one of the three primary e-mail protocols? - SMTP - SNMP - POP3 - IMAP

SNMP

Securing e-mail is something that must be done by - Networking administrators - Security administrators - Outlook express - Users

Users

All of the following techniques help to secure IM communications EXCEPT which of the following? - Running a corporate IM server - Using a different user name - Avoiding file transfers - Using encryption

Using a different user name

The Kurt Vonnegut commencement speech, the Neiman-Marcus Chocolate Chip Cookie Recipe, and the get-well e-mails to the dying boy are examples of __________. - social engineering - hoax e-mails - e-mail viruses - worms

hoax e-mails

A worm is a type of virus that ____________. - is scripted to send itself to other systems - is designed to crawl in under a firewall - buries itself between the kernel and the application layer of the operating system - is passed through e-mails with a subject heading that has the word "worm" in it

is scripted to send itself to other systems

One of the steps that the majority of system administrators running Internet e-mail servers have taken to reduce spam is to shut down ________. - spam filters - mail relaying - e-mail attachments - Outlook Express

mail relaying

One of the ways spam is able to propagate is by taking advantage of servers that will accept e-mail from anyone; these are known as ___________. - open servers - server relays - open relays - relay servers

open relays

Unsolicited commercial e-mail is known as __________. - hoax e-mail - worm - spam - spork

spam

One of the largest security problems with IM programs is ___________. - their inability to share files - the lack of support for encryption - the lack of support for video - the lack of support for hiding online presence

the lack of support for encryption

Malicious code that is scripted to send itself to other users is known as a ________. - virus - worm - Trojan - logic bomb

worm

S/MIME is a secure implementation of the MIME protocol. True or False

True

Viruses started as simple self-replicating program that spread via the transfer of floppy disks. True or False

True

What was the primary reason for the spread of the ILOVEYOU worm. - Network firewalls failed. - Systems did not have the appropriate software patch. - Automatic execution such as Microsoft Outlook's preview pane. - Virus scan software was not updated.

Automatic execution such as Microsoft Outlook's preview pane

Two tools that can be used to encrypt e-mail are ___________________. - MIME/S and PGP - PGP and S/MIME - PSP and MIME/S - PGP and SIME

PGP and S/MIME

A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a ____________. vvirus - hoax - Trojan - worm

Trojan

SubSeven and Back Orifice are examples of what kinds of malicious code? - Virus - Hoax - Worm - Trojan

Trojan

E-mail traffic is sent in plaintext by default and can be read easily by anyone who intercepts it. True or False

True

Hoax e-mails can have a real impact on bandwidth and productivity due to the distraction that can be caused by them. True or False

True

PGP uses _______________ encryption. - symmetric - asymmetric - shared key - elliptical

asymmetric

The two main places to filter spam are ________________. - at the host itself and the server - the firewall and the LAN - the proxy server and the LAN - the host and the firewall

at the host itself and the server


Related study sets

Dosage - Complexation and Protein Binding

View Set

Social media strategist ucertify Supercuts pt1

View Set

General Psychology: Chapters 6-11

View Set

Heckscher - Ohlin : Szakosodás a relatív tényezőellátottság alapján

View Set