question archive Which of the following may be part of a phishing attack? Select all that apply
Subject:Computer SciencePrice:3.86 Bought8
Which of the following may be part of a phishing attack? Select all that apply.
Group of answer choices
d) Drive-by download
c) A log in request that collects secret authentication credentials
a) Connection hijacking
b) Social engineering
Here are several statements about MIME. Select all that are true.
Group of answer choices
b) MIME performs virus scanning.
a) Plain text emails may only contain 7-bit characters; MIME allows messages to use a richer character set.
d) MIME has always been a part of the internet email standard.
c) A MIME email may contain two copies of a message: one in simple ASCII text and another in a richer text format.
When we receive an email message, in what order do the "Received" headers appear?
Group of answer choices
b) The first "Received" header comes from the MTA that first received the message, and the remaining "Received" headers appear from oldest to newest.
a) The first "Received" header comes from the MTA that placed the message in the recipient's mailbox, and the remaining "Received" headers appear in order of newest to oldest.
c) The first "Received" header comes from the MTA that placed the message in the recipient's mailbox, and the remaining "Received" headers appear in order of oldest to newest.
d) The "Received" headers appear in an arbitrary order.
While the first and last "Received" headers in an email might identify the ultimate source or destination, what type of information do other "Received" headers provide?
Group of answer choices
b) Each identifies an internet router that directs the message during delivery.
c) Each identifies a DNS lookup that takes place during email delivery.
d) Each identifies a web server that takes part in the email's delivery.
a) Each identifies an MTA that retrieves the entire email, message and forwards it to another MTA.
How do modern email systems try to resist connection-based attacks?
Group of answer choices
d) Email systems maintain blacklists of dangerous internet hosts and block connections with those hosts.
a) Most servers and clients use SSL/TLS.
b) Email services discourage connection-based services like POP3 and IMAP in preference to web-based email service.
c) Modern email client protocols incorporate more advanced security measures, like challenge response authentication, at the application level to resist all connection-based attacks.
Question 1
Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually performed through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim's machine.
From the above choices of answers, A log in request that collects secret authentication credentials and Social Engineering are examples of Phishing attacks.
Social engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Therefore choices (c) and (b) are true.
Question 2
Here are several statements about MIME. Select all that are true.
Group of answer choices
b) MIME performs virus scanning.
a) Plain text emails may only contain 7-bit characters; MIME allows messages to use a richer character set.
d) MIME has always been a part of the internet email standard.
c) A MIME email may contain two copies of a message: one in simple ASCII text and another in a richer text format.
Question 3
When we receive an email message, in what order do the "Received" headers appear?
Group of answer choices
b) The first "Received" header comes from the MTA that first received the message, and the remaining "Received" headers appear from oldest to newest.
a) The first "Received" header comes from the MTA that placed the message in the recipient's mailbox, and the remaining "Received" headers appear in order of newest to oldest.
c) The first "Received" header comes from the MTA that placed the message in the recipient's mailbox, and the remaining "Received" headers appear in order of oldest to newest.
d) The "Received" headers appear in an arbitrary order.
The received is the most important part of the email header and is usually the most reliable. They form a list of all the servers/computers through which the message traveled in order to reach you.
The received lines are best read from bottom to top. That is, the first "Received:" line is your own system or mail server. The last "Received:" line is where the mail originated. Each mail system has their own style of "Received:" line. A "Received:" line typically identifies the machine that received the mail and the machine from which the mail was received.
Therefore option (b) is correct.
Question 4
While the first and last "Received" headers in an email might identify the ultimate source or destination, what type of information do other "Received" headers provide?
Group of answer choices
b) Each identifies an internet router that directs the message during delivery.
c) Each identifies a DNS lookup that takes place during email delivery.
d) Each identifies a web server that takes part in the email's delivery.
a) Each identifies an MTA that retrieves the entire email, message and forwards it to another MTA.
Question 5
How do modern email systems try to resist connection-based attacks?
Group of answer choices
d) Email systems maintain blacklists of dangerous internet hosts and block connections with those hosts.
a) Most servers and clients use SSL/TLS.
b) Email services discourage connection-based services like POP3 and IMAP in preference to web-based email service.
c) Modern email client protocols incorporate more advanced security measures, like challenge response authentication, at the application level to resist all connection-based attacks.