IS4670 CHAPTER 10 TERMS & DEFINITIONS Flashcards

1
Q
  • An e-mail server that strips identifying information from an e-mail message before forwarding it with the mailing computer’s IP address.
A

Anonymizer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Sending an e-mail message to an anonymizer to strip identifying information from an e-mail message before forwarding it with the mailing computer’s IP address.
A

Anonymous remailing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • A federal act that extends legal protection against wiretapping and other forms of unauthorized interception to e-mail, mobile telephones, pagers, computer transmissions, and communications provided by private communication carriers.
A

Electronic Communications Privacy Act (ECPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • A file such as a picture, document, audio file, program, or video that is attached to an e-mail message.
A

E-mail attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

– An area of an e-mail message that contains the content of the communication.

A

E-mail body

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • A software program used to compose and read e-mail messages
A

E-mail client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • An area of an e-mail message that contains addressing information and the route that an e-mail takes from sender to receiver. It is an abbreviated record of the e-mail message’s journey.
A

E-mail header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • A record of each e-mail message that passes through a computer in a network.
A

E-mail log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Examining e-mail header and other information to determine the route the e-mail has traveled and the sender’s identity. These programs and services can be used to resolve problems with sexually harassing e-mail, cyber- stalking, and other unwanted Internet and intranet communications.
A

E-mail tracing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • A protocol that allows an e-mail client to access e-mail on a remote mail server.
A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • A server typically used within local networks to transmit e-mail messages among local users. These are often used in e-mail aliasing: They forward mail for multiple e-mail addresses to a single address.
A

Mail relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • A device and/or program that routes an e-mail to the correct destination. It functions as an electronic post office, sending and receiving electronic mail. Most of the time, the mail server is separate from the computer where the mail was composed.
A

Mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • A protocol that local e-mail clients use to retrieve e-mail from a remote server.
A

Post Office Protocol (POP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • A protocol that mail servers use to send and receive mail messages. E-mail clients use this to send messages to a mail server for relaying.
A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Monitoring network data using a self- contained software program or a hardware device. Users examine network traffic, making a copy of the data without redirecting or altering it.
A

Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Abusing electronic messaging systems to send unsolicited, unwanted bulk messages indiscriminately.
A

Spamming

17
Q
  • Making an e-mail message appear to come from someone other than the real sender or location.-
A

Spoofing