and CORRECT Answers
Which of the following can administrators use to filter out the IP addresses of known spammers?
- CORRECT ANSWER - Blackhole list
Which of the following protocols support the encryption and decryption of e-mail messages? -
CORRECT ANSWER - Secure Multipurpose Internet Mail Extensions (S/MIME) and
Pretty Good Privacy (PGP)
Which of the following can be used to detect automated systems used by spammers for
registering e-mail accounts? - CORRECT ANSWER - CAPTCHA (Completely Automated
Public Turing Test to Tell Computers and Humans Apart)
What is the term for an SMTP server that allows the third-party relay of e-mail messages that
spammers use to send spam? - CORRECT ANSWER - Open relay
E-mail message headers consist of: - CORRECT ANSWER - the To, Cc, Bcc, Subject and
Attachment components
Why should you use out-of-office messages when you will be out of the office for an extended
period of time? - CORRECT ANSWER - To explain why you may not respond to e-mail
messages within a reasonably short period of time
If your organization scans e-mail attachments to ensure that they contain no malicious code,
where does the scanning take place? - CORRECT ANSWER - At the e-mail server
Which of the following can be considered an advantage of Web-based e-mail? - CORRECT
ANSWER - You can log on and check your e-mail from any computer that has Internet
access