question archive Which of the following may be part of a phishing attack? Select all that apply
Subject:Computer SciencePrice:3.86 Bought8
Which of the following may be part of a phishing attack? Select all that apply.
Group of answer choices
d) Drive-by download
c) A log in request that collects secret authentication credentials
a) Connection hijacking
b) Social engineering
Here are several statements about MIME. Select all that are true.
Group of answer choices
b) MIME performs virus scanning.
a) Plain text emails may only contain 7-bit characters; MIME allows messages to use a richer character set.
d) MIME has always been a part of the internet email standard.
c) A MIME email may contain two copies of a message: one in simple ASCII text and another in a richer text format.
When we receive an email message, in what order do the "Received" headers appear?
Group of answer choices
b) The first "Received" header comes from the MTA that first received the message, and the remaining "Received" headers appear from oldest to newest.
a) The first "Received" header comes from the MTA that placed the message in the recipient's mailbox, and the remaining "Received" headers appear in order of newest to oldest.
c) The first "Received" header comes from the MTA that placed the message in the recipient's mailbox, and the remaining "Received" headers appear in order of oldest to newest.
d) The "Received" headers appear in an arbitrary order.
While the first and last "Received" headers in an email might identify the ultimate source or destination, what type of information do other "Received" headers provide?
Group of answer choices
b) Each identifies an internet router that directs the message during delivery.
c) Each identifies a DNS lookup that takes place during email delivery.
d) Each identifies a web server that takes part in the email's delivery.
a) Each identifies an MTA that retrieves the entire email, message and forwards it to another MTA.
How do modern email systems try to resist connection-based attacks?
Group of answer choices
d) Email systems maintain blacklists of dangerous internet hosts and block connections with those hosts.
a) Most servers and clients use SSL/TLS.
b) Email services discourage connection-based services like POP3 and IMAP in preference to web-based email service.
c) Modern email client protocols incorporate more advanced security measures, like challenge response authentication, at the application level to resist all connection-based attacks.
Purchased 8 times