Security+ Chapter 16
Which TCP port does POP3 use? - 25 - 110 - 143 - 443
110
Question 9 4 / 4 pts <p>What TCP port does IMAP use?</p> What TCP port does IMAP use? - 110 - 25 - 143 - 443
143
What TCP port does SMTP use? - 25 - 110 - 143 - 443
25
The first instant messaging program was ___________. - AOL Instant Messenger - Yahoo Instant Messenger - MSN Instant Messenger - Linux Instant Messenger
AOL Instant Messenger
Most instant messaging programs natively support encryption. True or False
False
Names not on a DNS blacklist get filtered out, and those messages are not received. True or False
False
SMTP uses TCP port 110. True or False
False
The trends show that e-mail hoaxes are being thwarted due to new technology. True or False
False
Unsolicited commercial e-mail is referred to as a hoax e-mail. True or False
False
Viruses can exist independent of a file, whereas worms require a file to infect. True or False
False
Which of the following is NOT one of the three primary e-mail protocols? - SMTP - SNMP - POP3 - IMAP
SNMP
Securing e-mail is something that must be done by - Networking administrators - Security administrators - Outlook express - Users
Users
All of the following techniques help to secure IM communications EXCEPT which of the following? - Running a corporate IM server - Using a different user name - Avoiding file transfers - Using encryption
Using a different user name
The Kurt Vonnegut commencement speech, the Neiman-Marcus Chocolate Chip Cookie Recipe, and the get-well e-mails to the dying boy are examples of __________. - social engineering - hoax e-mails - e-mail viruses - worms
hoax e-mails
A worm is a type of virus that ____________. - is scripted to send itself to other systems - is designed to crawl in under a firewall - buries itself between the kernel and the application layer of the operating system - is passed through e-mails with a subject heading that has the word "worm" in it
is scripted to send itself to other systems
One of the steps that the majority of system administrators running Internet e-mail servers have taken to reduce spam is to shut down ________. - spam filters - mail relaying - e-mail attachments - Outlook Express
mail relaying
One of the ways spam is able to propagate is by taking advantage of servers that will accept e-mail from anyone; these are known as ___________. - open servers - server relays - open relays - relay servers
open relays
Unsolicited commercial e-mail is known as __________. - hoax e-mail - worm - spam - spork
spam
One of the largest security problems with IM programs is ___________. - their inability to share files - the lack of support for encryption - the lack of support for video - the lack of support for hiding online presence
the lack of support for encryption
Malicious code that is scripted to send itself to other users is known as a ________. - virus - worm - Trojan - logic bomb
worm
S/MIME is a secure implementation of the MIME protocol. True or False
True
Viruses started as simple self-replicating program that spread via the transfer of floppy disks. True or False
True
What was the primary reason for the spread of the ILOVEYOU worm. - Network firewalls failed. - Systems did not have the appropriate software patch. - Automatic execution such as Microsoft Outlook's preview pane. - Virus scan software was not updated.
Automatic execution such as Microsoft Outlook's preview pane
Two tools that can be used to encrypt e-mail are ___________________. - MIME/S and PGP - PGP and S/MIME - PSP and MIME/S - PGP and SIME
PGP and S/MIME
A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a ____________. vvirus - hoax - Trojan - worm
Trojan
SubSeven and Back Orifice are examples of what kinds of malicious code? - Virus - Hoax - Worm - Trojan
Trojan
E-mail traffic is sent in plaintext by default and can be read easily by anyone who intercepts it. True or False
True
Hoax e-mails can have a real impact on bandwidth and productivity due to the distraction that can be caused by them. True or False
True
PGP uses _______________ encryption. - symmetric - asymmetric - shared key - elliptical
asymmetric
The two main places to filter spam are ________________. - at the host itself and the server - the firewall and the LAN - the proxy server and the LAN - the host and the firewall
at the host itself and the server
