Ch 15 Quiz

11 September 2022
4.7 (114 reviews)
25 test answers

Unlock all answers in this set

Unlock answers (21)
question
T or F: The email delivery protocol is called Simple Mail Transfer Protocol
answer
True Topic: 15.2.1
question
True or False: When a packet arrives at a firewall, the firewall applies its filtering rules in order.
answer
True Topic: 15.4.3
question
T or F: Phises rely on spammers in order to be untraceable.
answer
True Topic: 15.3.2
question
T or F: Blacklists identify reputable email servers.
answer
False Topic: 15.3.1
question
Another term for an SMTP email server is: A) MIME B) Message Transfer Agent (MTA) C) TCP Server D) None of the answers
answer
B) Message Transfer Agent (MTA) Topic: 15.2.1 : Email Protocol Standards - Email delivery
question
T or F: Traditional applications generally follow the database model.
answer
False. Topic: 15.1
question
T or F: The ARPANET was so reliable that many organizations used it for routine data traffic.
answer
True. Topic: 15.4
question
A email security problem that can be prevented from occurring is: A) An email virus B) Phishing C) A connection-based attack D) Spam
answer
C) A connection-based attack Topic: 15.3 Email Security Problems - Connection-based attacks
question
A point of presence system that analyzes network traffic to detect leaking data is: A) An IPS B) A DMZ C) An IDS D) A Data Loss Prevention System
answer
D) A data loss prevention system Topic: 15.5 Enterprise Point of Presence
question
MIME stands for? A) Multipart Internet Message Extensions B) Multiple Interactions Message Exterior C) Multitask Interconnections Manager Externals D) Multipart Interweb Message Extensions
answer
A) Multipart Internet Message Extensions Topic: 15.2
question
Firewalls use the following mechanisms to filter traffic except: A)Session Filtering B) Hardware Filtering C) Packet filtering D) Application filtering
answer
B) Hardware filtering Topic: 15.4.2 Traffic Filtering Mechanisms
question
T or F: In email, "From" identifies the mail protocol being used, and also may identify the MTA software.
answer
False Topic: 15.2.2
question
T or F: There are RFCs that describe challenge-response authentication techniques to use with email.
answer
True Topic: 15.3
question
T or F: All forgeries can be detected by examining the oldest received header.
answer
False Topic: 15.2.3
question
T or F: Direction Control is whether the application data violates specific restrictions.
answer
False Topic: 15.4.1
question
Mailbox protocols include: A. Internet Message Access Protocol (IMAP) B. Simple Mail Transfer Protocol (SMTP) C. Internet Control Message Protocol (ICMP) D. Post Office Protocol 3 (POP3)
answer
A) Internet Message Access Protocol (IMAP) B) Simple Mail Transfer Protocol (SMTP) D) Post Office Protocol 3 (POP3) Topic: 15.2.1 Email Protocol Standards
question
Chain emails often result in: A. spread of a macro virus B. excessive email traffic directed at a victim C. all of the answers D. recipients visiting a website that attacks their computer
answer
B) Excessive email traffic directed at a victim Topic: 15.3.3 Email Viruses and hoaxes - Email chain Letters
question
You can often determine that an email message is a forgery by examining the: A. the first Received header B. the From field C. the To field D. the last Received header
answer
A) the first received header Topic: 15.2.3 Forging an email message
question
Session filtering keeps track of session/connection states and filters on a packet's: A. IP header B. link header C. application data D. TCP/UDP header
answer
A) IP Header D) TCP/UDP header Topic: 15.4.2 Traffic-Filtering Mechanisms
question
T or F: The Bastion Host is a strongly secured host that provides services to the Internet.
answer
True Topic: 15.5.1
question
T or F: It is okay to have the MTA automatically delete all emails suspected of spam.
answer
False Topic: 15.3.1
question
T or F: Filtering for spam sometimes produces a false positive, in which legitimate email is identified as spam.
answer
True Topic: 15.3.1
question
DNS provides records to look up email servers. The records are called: A. A B. MX C. ESMTP D. ML
answer
B. MX Topic: 15.2.2 Tracking an email
question
Use TCP as the transport protocol. A. Mailbox and Delivery B. Ping C. DHCP D. ARP
answer
A. Mailbox and Delivery Topic: 15.2.1
question
Using content control to control Internet traffic, a gateway focuses on a packet's: A. IP header B. TCP/UDP header C. link header D. application data
answer
D. Application Data Topic: 15.4.1 controlling Internet Traffic