Key Terms 5 Flashcards

1
Q

An Internet standard protocol for electronic mail (e-mail) transmission across IP-based networks.

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An Internet standard protocol used by e-mail clients to retrieve e-mail from a remote server and supports simple download-and-delete requirements for access to remote mailboxes.

A

Post Office Protocol (POP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An Internet standard protocol used by e-mail clients to retrieve e-mail from a remote server. E-mail clients using BLANK generally leave messages on the server until the user explicitly deletes them.

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols and allows any authentication mechanism supported by BLANK to be used in any application protocol that uses BLANK.

A

Simple Authentication and Security Layer (SASL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An SMTP server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users.

A

Open mail relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. Since SMTP does not provide any authentication, it is easy to impersonate and forge e-mails.

A

E-mail spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An e-mail validation system designed to prevent e-mail spam by detecting e-mail spoofing, a common vulnerability, by verifying sender IP addresses.

A

Sender Policy Framework (SPF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A way of attempting to obtain data such as usernames, passwords, credit card information, and other sensitive data by masquerading as an authenticated entity in an electronic communication. Spear phishing targets individuals, and whaling targets people with high authorization (CEO, COO, CIO).

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of modifying IP address information in packet headers while in transit across a traffic routing device, with the goal of reducing the demand for public IP addresses.

A

Network address translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly