Deck 26: Keeping E-Mail Secure

Full screen (f)
exit full mode
Question
________ encryption is the most commonly used encryption on the Internet.
Use Space or
up arrow
down arrow
to flip the card.
Question
A(n) ________ is a specialized computer with the sole function of storing, processing, and sending e-mail.
Question
Which protocol uses standard Internet connections to make phone calls over the Internet?

A) POP
B) SMTP
C) MIME
D) VoIP
Question
Which of the following specifications is used to simplify attachments to e-mail messages?

A) SMTP
B) Telnet
C) MIME
D) POP
Question
________ technology is used to make free long-distance calls.
Question
________ is the ability of two or more people to communicate in text over the Internet in real time.

A) VoIP
B) SMTP
C) Remote handshaking
D) Instant messaging
Question
________ is the process of encoding data so that only the person with the key can decode and read the message.
Question
When only the two parties involved in sending a message have the code, this is called ________-key encryption.

A) private
B) foreign
C) public
D) protocol
Question
In ________ encryption, a key pair is created, where one key is for coding and the other is for decoding.
Question
Which protocol is used to transmit e-mail over the Internet?

A) FTP
B) SMTP
C) HTTP
D) VoIP
Question
Which of the following is an example of an e-mail client?

A) AOL Messenger
B) Dropbox
C) iCloud
D) Microsoft Outlook
Question
A good way to protect your e-mails is to use ________.

A) the Secure Sockets Layer (SSL) protocol
B) the post office protocol (POP)
C) encryption
D) compression
Question
Match each of the following terms to its definition:
I. MIME
II. VoIP
III. SMTP
IV. PGP
V. encryption
A. protocol responsible for sending e-mail along the Internet to its destination
B. public-key encryption package
C. technology used to transmit phone calls over the Internet
D. protocol used for sending attachments with e-mail
E. process of coding an e-mail so that only the recipient can read it
Question
In ________ encryption, only the two parties involved in sending a message have the code to unlock the message.
Question
A secure website using SSL encryption will have ________ followed by ://www.websitename.com as the protocol in its URL.
Question
MIME is primarily associated with this feature of e-mail.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/16
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 26: Keeping E-Mail Secure
1
________ encryption is the most commonly used encryption on the Internet.
Public-key; Public key
2
A(n) ________ is a specialized computer with the sole function of storing, processing, and sending e-mail.
e-mail server; email server
3
Which protocol uses standard Internet connections to make phone calls over the Internet?

A) POP
B) SMTP
C) MIME
D) VoIP
D
4
Which of the following specifications is used to simplify attachments to e-mail messages?

A) SMTP
B) Telnet
C) MIME
D) POP
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
5
________ technology is used to make free long-distance calls.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
6
________ is the ability of two or more people to communicate in text over the Internet in real time.

A) VoIP
B) SMTP
C) Remote handshaking
D) Instant messaging
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
7
________ is the process of encoding data so that only the person with the key can decode and read the message.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
8
When only the two parties involved in sending a message have the code, this is called ________-key encryption.

A) private
B) foreign
C) public
D) protocol
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
9
In ________ encryption, a key pair is created, where one key is for coding and the other is for decoding.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
10
Which protocol is used to transmit e-mail over the Internet?

A) FTP
B) SMTP
C) HTTP
D) VoIP
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is an example of an e-mail client?

A) AOL Messenger
B) Dropbox
C) iCloud
D) Microsoft Outlook
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
12
A good way to protect your e-mails is to use ________.

A) the Secure Sockets Layer (SSL) protocol
B) the post office protocol (POP)
C) encryption
D) compression
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
13
Match each of the following terms to its definition:
I. MIME
II. VoIP
III. SMTP
IV. PGP
V. encryption
A. protocol responsible for sending e-mail along the Internet to its destination
B. public-key encryption package
C. technology used to transmit phone calls over the Internet
D. protocol used for sending attachments with e-mail
E. process of coding an e-mail so that only the recipient can read it
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
14
In ________ encryption, only the two parties involved in sending a message have the code to unlock the message.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
15
A secure website using SSL encryption will have ________ followed by ://www.websitename.com as the protocol in its URL.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
16
MIME is primarily associated with this feature of e-mail.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 16 flashcards in this deck.