T or F:
The email delivery protocol is called Simple Mail Transfer Protocol
answer
True
Topic: 15.2.1
question
True or False:
When a packet arrives at a firewall, the firewall applies its filtering rules in order.
answer
True
Topic: 15.4.3
question
T or F:
Phises rely on spammers in order to be untraceable.
answer
True
Topic: 15.3.2
question
T or F:
Blacklists identify reputable email servers.
answer
False
Topic: 15.3.1
question
Another term for an SMTP email server is:
A) MIME
B) Message Transfer Agent (MTA)
C) TCP Server
D) None of the answers
answer
B) Message Transfer Agent (MTA)
Topic: 15.2.1 : Email Protocol Standards - Email delivery
question
T or F:
Traditional applications generally follow the database model.
answer
False.
Topic: 15.1
question
T or F:
The ARPANET was so reliable that many organizations used it for routine data traffic.
answer
True.
Topic: 15.4
question
A email security problem that can be prevented from occurring is:
A) An email virus
B) Phishing
C) A connection-based attack
D) Spam
answer
C) A connection-based attack
Topic: 15.3 Email Security Problems - Connection-based attacks
question
A point of presence system that analyzes network traffic to detect leaking data is:
A) An IPS
B) A DMZ
C) An IDS
D) A Data Loss Prevention System
answer
D) A data loss prevention system
Topic: 15.5 Enterprise Point of Presence
question
MIME stands for?
A) Multipart Internet Message Extensions
B) Multiple Interactions Message Exterior
C) Multitask Interconnections Manager Externals
D) Multipart Interweb Message Extensions
answer
A) Multipart Internet Message Extensions
Topic: 15.2
question
Firewalls use the following mechanisms to filter traffic except:
A)Session Filtering
B) Hardware Filtering
C) Packet filtering
D) Application filtering
answer
B) Hardware filtering
Topic: 15.4.2 Traffic Filtering Mechanisms
question
T or F:
In email, "From" identifies the mail protocol being used, and also may identify the MTA software.
answer
False
Topic: 15.2.2
question
T or F:
There are RFCs that describe challenge-response authentication techniques to use with email.
answer
True
Topic: 15.3
question
T or F:
All forgeries can be detected by examining the oldest received header.
answer
False
Topic: 15.2.3
question
T or F:
Direction Control is whether the application data violates specific restrictions.
answer
False
Topic: 15.4.1
question
Mailbox protocols include:
A. Internet Message Access Protocol (IMAP)
B. Simple Mail Transfer Protocol (SMTP)
C. Internet Control Message Protocol (ICMP)
D. Post Office Protocol 3 (POP3)
answer
A) Internet Message Access Protocol (IMAP)
B) Simple Mail Transfer Protocol (SMTP)
D) Post Office Protocol 3 (POP3)
Topic: 15.2.1 Email Protocol Standards
question
Chain emails often result in:
A. spread of a macro virus
B. excessive email traffic directed at a victim
C. all of the answers
D. recipients visiting a website that attacks their computer
answer
B) Excessive email traffic directed at a victim
Topic: 15.3.3 Email Viruses and hoaxes - Email chain Letters
question
You can often determine that an email message is a forgery by examining the:
A. the first Received header
B. the From field
C. the To field
D. the last Received header
answer
A) the first received header
Topic: 15.2.3 Forging an email message
question
Session filtering keeps track of session/connection states and filters on a packet's:
A. IP header
B. link header
C. application data
D. TCP/UDP header
answer
A) IP Header
D) TCP/UDP header
Topic: 15.4.2 Traffic-Filtering Mechanisms
question
T or F:
The Bastion Host is a strongly secured host that provides services to the Internet.
answer
True
Topic: 15.5.1
question
T or F:
It is okay to have the MTA automatically delete all emails suspected of spam.
answer
False
Topic: 15.3.1
question
T or F:
Filtering for spam sometimes produces a false positive, in which legitimate email is identified as spam.
answer
True
Topic: 15.3.1
question
DNS provides records to look up email servers. The records are called:
A. A
B. MX
C. ESMTP
D. ML
answer
B. MX
Topic: 15.2.2 Tracking an email
question
Use TCP as the transport protocol.
A. Mailbox and Delivery
B. Ping
C. DHCP
D. ARP
answer
A. Mailbox and Delivery
Topic: 15.2.1
question
Using content control to control Internet traffic, a gateway focuses on a packet's:
A. IP header
B. TCP/UDP header
C. link header
D. application data
answer
D. Application Data
Topic: 15.4.1 controlling Internet Traffic
Haven't found what you need?
Search for quizzes and test answers now
Quizzes.studymoose.com uses cookies. By continuing you agree to our cookie policy