Você está na página 1de 2

c 

    

    
  
   
1. One of your clients is attempting to use Outlook Express to send an encrypted e-mail to
someone
whose proprietary e-mail software is configured only for 64-bit RC2 encryption. However, the
other
person¶s system is rejecting the e-mail. What might be the problem?
á d. Outlook Express does not support 64-bit encryption for sending a message.
2. Another of your clients is using an older computer that has e-mail software that only supports
SMTP.
This user is unable to send an image file. Your diagnosis shows that____________________.
(Choose
all that apply.)
á c. his e-mail software does not support MIME
3. The latest version of S/MIME _______________________________. (Choose all that apply.)
á a. and b.
4. Your organization wants to offer e-mail access for clients through an Internet Web server. In
providing
this access, the organization wants a system that will (1) enable users to store e-mail in different
folders, (2) offer the option to search folders for a specific e-mail, and (3) show that a message
has
been read. Which of the following should they implement on the new e-mail server? (Choose all
that
apply.)
á a. and d.
5. A mail user agent is ______________________________.
á a. a program used to compose an e-mail message and to read an e-mail message
6. Which of the following uses a web of trust?
á b. PGP
7. During a management meeting one of the security officers in your organization complains that
he
wastes up to an hour each day just hand-delivering new passwords for users who have forgotten
theirs.
He suggests adopting a policy to send new passwords through e-mail. What is your response?
á a. You recommend adopting a company-wide policy to prevent anyone from sending a
user account password through e-mail.
8. GnuPG is most similar to _______________.
á d. PGP
9. The users in your organization are active Internet participants and therefore are now the
recipients of
lots of junk e-mail. Many users waste a lot of time each day reading and deleting their junk e-
mail.
Which e-mail software is best positioned to address junk e-mail?
á c. Apple Mail
10. Which of the following encryption methods are used in PGP? (Choose all that apply.)
á a. and d.
11. The business manager in your company is using S/MIME and a digital certificate, but her
secret
communications with other users are not working. Which of the following might be the problem?
(Choose all that apply.)
á c. The digital certificate is nonstandard, and so does not conform to X.509.
2
12. The DNS server administrator in your organization has discovered that some DNS records
related to
the organization¶s SMTP server have been alternated. Which of the following records are
candidates
for an attacker to change? (Choose all that apply.)
á b. and c.
13. When an attacker targets an e-mail communication that uses POP3, which TCP port is he or
she likely
to use in the attack?
á a. 110
14. An SMTP message is encoded in ____________________________.
á b. 7-bit ASCII
15. A man-in-the-middle e-mail attacker has been intercepting e-mail messages from the board
members
of your corporation and sending copies to a manager in a competing company. He is likely to be
altering the __________________________. (Choose all that apply.)
á : a. and b.
16. One of your Apple Mail users configured this software for security and is now not receiving
any email.
Which of the following might be the problem?
á a. He configured to use TCP port 32, but should be using TCP port 25.
17. A disgruntled employee in your organization has been sending malicious e-mail to all of the
managers.
Of the following choices, what system is this person most likely using?
á b. a command-line MTA
18. The finance director for a college has been trying to encrypt her e-mail in Outlook Express,
but is not
succeeding. What might be the problem?
á c. She must first obtain a digital certificate from a CA.
19. A user who is employing the web of trust is currently discarding lots of e-mail, most likely
because
_____________________________________.
á a. that user¶s circle of trusted colleagues is too small
20. When SMTP transports a message to a station, but that station is not available, what happens
next?
á d. SMTP can retry sending to the recipient for a specified time period before it notifies
the sender that the message did not go through.|

Você também pode gostar