Deck 12: Electronic Mail

ملء الشاشة (f)
exit full mode
سؤال
E-Mail is a common source of distributing worms and viruses.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A Telnet session to a POP3 server is accomplished by entering a command similar to ____.

A) telnet athena.sunybroome.edu 25
B) telnet athena.sunybroome.edu 1101
C) telnet athena.sunybroome.edu 110
D) telnet 110 athena.sunybroome.edu
سؤال
Electronic mail uses the ____ model to allow mail messages to be exchanged.

A) client-server
B) client-client
C) servlet-servlet
D) server-server
سؤال
The ____ is used to deliver e-mail content securely.

A) Safe Multipurpose Internet Mail Extensions
B) Secure Multipurpose Interface Mail Enabler
C) Secure Multipurpose Internet Mail Extensions
D) Secure Multipurpose Internet Mail Environment
سؤال
Using a protocol analyzer, it is possible to capture all of the activity associated with sending an electronic mail message.
سؤال
In order to use any e-mail client program, it must be ____________________ properly.
سؤال
The current version of IMAP is ____.

A) IMAP3rev1
B) IMAP3rev4
C) IMAP4rev1
D) IMAP4rev4
سؤال
____ provide a way for binary programs, graphical images, or other types of files to be attached to an e-mail message.

A) Multipurpose Internet Mail Environments
B) Multipurpose Interface Mail Extensions
C) Multipurpose Internet Management Extensions
D) Multipurpose Internet Mail Extensions
سؤال
A(n) ____________________ program exchanges information with a designated e-mail server to send and receive messages.
سؤال
A blank line is used as the separator between the parts of an email message.
سؤال
The Internet Network Authority is responsible for maintenance of the Top Level Domains.
سؤال
The mailbox portion of the address is often made from a user's ____.

A) home address
B) first name
C) server name
D) account name
سؤال
A(n) ____ consists of a keyword followed by a colon and additional information.

A) body
B) header
C) message
D) address
سؤال
____ is designed to eliminate the typical problems that are caused by downloading the electronic messages to a client computer using the Post Office Protocol.

A) SMTP
B) IMAP
C) HTTP
D) RPC
سؤال
Managing e-mail with ____ allows for complete access to messages stored on the server from as many client computers as necessary.

A) IMAP
B) POP3
C) SMTP
D) IMAM
سؤال
The second part of an email message is called the ____________________ and contains the actual text of the message.
سؤال
The ____________________ encoding method is used to encode 8-bit text codes such as those used in a foreign language character set into 7-bit U.S. ASCII characters.
سؤال
____________________ is used to exchange messages between servers or between a client and a server.
سؤال
Two of the most common e-mail errors stem from the user incorrectly specifying either ____.

A) the mailbox name or the computer name
B) the username or the mailbox name
C) the computer name or the server name
D) the username or the user's address
سؤال
IMAP does not provide direct access to the messages that are stored on the server.
سؤال
List three features that the MIME standard provides.
سؤال
Match between columns
A protocol designed to provide access to electronic messages that are stored on a mail server
SMTP
A protocol designed to provide access to electronic messages that are stored on a mail server
Header
A protocol designed to provide access to electronic messages that are stored on a mail server
Base64 encoding method
A protocol designed to provide access to electronic messages that are stored on a mail server
IMAP
A protocol designed to provide access to electronic messages that are stored on a mail server
IMAP4
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
SMTP
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
Header
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
Base64 encoding method
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
IMAP
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
IMAP4
Used primarily to transfer binary attachments
SMTP
Used primarily to transfer binary attachments
Header
Used primarily to transfer binary attachments
Base64 encoding method
Used primarily to transfer binary attachments
IMAP
Used primarily to transfer binary attachments
IMAP4
First part of an email message
SMTP
First part of an email message
Header
First part of an email message
Base64 encoding method
First part of an email message
IMAP
First part of an email message
IMAP4
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
SMTP
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
Header
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
Base64 encoding method
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
IMAP
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
IMAP4
سؤال
Describe the features of IMAP4rev1.
سؤال
Why should public e-mail client computer systems never be configured to save an e-mail password?
سؤال
What is IMAP and what does it do?
سؤال
Discuss the issue with sending messages in clear text.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/26
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Electronic Mail
1
E-Mail is a common source of distributing worms and viruses.
True
2
A Telnet session to a POP3 server is accomplished by entering a command similar to ____.

A) telnet athena.sunybroome.edu 25
B) telnet athena.sunybroome.edu 1101
C) telnet athena.sunybroome.edu 110
D) telnet 110 athena.sunybroome.edu
C
3
Electronic mail uses the ____ model to allow mail messages to be exchanged.

A) client-server
B) client-client
C) servlet-servlet
D) server-server
A
4
The ____ is used to deliver e-mail content securely.

A) Safe Multipurpose Internet Mail Extensions
B) Secure Multipurpose Interface Mail Enabler
C) Secure Multipurpose Internet Mail Extensions
D) Secure Multipurpose Internet Mail Environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
5
Using a protocol analyzer, it is possible to capture all of the activity associated with sending an electronic mail message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
6
In order to use any e-mail client program, it must be ____________________ properly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
7
The current version of IMAP is ____.

A) IMAP3rev1
B) IMAP3rev4
C) IMAP4rev1
D) IMAP4rev4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ provide a way for binary programs, graphical images, or other types of files to be attached to an e-mail message.

A) Multipurpose Internet Mail Environments
B) Multipurpose Interface Mail Extensions
C) Multipurpose Internet Management Extensions
D) Multipurpose Internet Mail Extensions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
9
A(n) ____________________ program exchanges information with a designated e-mail server to send and receive messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
10
A blank line is used as the separator between the parts of an email message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
11
The Internet Network Authority is responsible for maintenance of the Top Level Domains.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
12
The mailbox portion of the address is often made from a user's ____.

A) home address
B) first name
C) server name
D) account name
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
13
A(n) ____ consists of a keyword followed by a colon and additional information.

A) body
B) header
C) message
D) address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ is designed to eliminate the typical problems that are caused by downloading the electronic messages to a client computer using the Post Office Protocol.

A) SMTP
B) IMAP
C) HTTP
D) RPC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
15
Managing e-mail with ____ allows for complete access to messages stored on the server from as many client computers as necessary.

A) IMAP
B) POP3
C) SMTP
D) IMAM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
16
The second part of an email message is called the ____________________ and contains the actual text of the message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
17
The ____________________ encoding method is used to encode 8-bit text codes such as those used in a foreign language character set into 7-bit U.S. ASCII characters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
18
____________________ is used to exchange messages between servers or between a client and a server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
19
Two of the most common e-mail errors stem from the user incorrectly specifying either ____.

A) the mailbox name or the computer name
B) the username or the mailbox name
C) the computer name or the server name
D) the username or the user's address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
20
IMAP does not provide direct access to the messages that are stored on the server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
21
List three features that the MIME standard provides.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match between columns
A protocol designed to provide access to electronic messages that are stored on a mail server
SMTP
A protocol designed to provide access to electronic messages that are stored on a mail server
Header
A protocol designed to provide access to electronic messages that are stored on a mail server
Base64 encoding method
A protocol designed to provide access to electronic messages that are stored on a mail server
IMAP
A protocol designed to provide access to electronic messages that are stored on a mail server
IMAP4
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
SMTP
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
Header
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
Base64 encoding method
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
IMAP
Specifies how electronic messages are exchanged between computers using the Transmission Control Protocol
IMAP4
Used primarily to transfer binary attachments
SMTP
Used primarily to transfer binary attachments
Header
Used primarily to transfer binary attachments
Base64 encoding method
Used primarily to transfer binary attachments
IMAP
Used primarily to transfer binary attachments
IMAP4
First part of an email message
SMTP
First part of an email message
Header
First part of an email message
Base64 encoding method
First part of an email message
IMAP
First part of an email message
IMAP4
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
SMTP
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
Header
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
Base64 encoding method
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
IMAP
Includes features such as concurrent access to shared mailboxes, online and offline access to messages, and management from any computer
IMAP4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
23
Describe the features of IMAP4rev1.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
24
Why should public e-mail client computer systems never be configured to save an e-mail password?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
25
What is IMAP and what does it do?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
26
Discuss the issue with sending messages in clear text.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.