Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
49 Cards in this Set
- Front
- Back
What protocol supports the encryption and decryption of e-mail messages?
|
Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)
|
|
What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?
|
Mail Delivery Agent (MDA)
|
|
When you receive an e-mail transmission with an attachment, how does your browser know which application or plug-in to open to view or play the attachment?
|
The MIME definition for the application or plug-in that is located inside the HTTP header at the beginning of the transmission
|
|
Pretty Good Privacy (PGP) and GNU Privacy Guard (GPG) encrypt:
|
The e-mail message and its attachments
|
|
What is known as a "store-and-forward" e-mail service?
|
Post Office Protocol version 3 (POP3)
|
|
What enables users on different e-mail systems to exchange messages?
|
Gateways
|
|
What is a protocol that can be used by applications to automatically process files downloaded from the Internet?
|
Multipurpose Internet Mail Extensions (MIME)
|
|
What is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?
|
GNU Privacy Guard (GPG)
|
|
E-mail message headers consist of:
|
The To, Cc, Bcc, Subject and Attachment components
|
|
The commonplace use of e-mail has given rise to the term "snail mail," which is a slang term for what?
|
Standard postal service
|
|
What is considered the de factostandard communication tool for business?
|
Electronic mail (e-mail)
|
|
What symbol does an e-mail address use to separate the user name from the domain?
|
At ( @ )
|
|
What part of an e-mail address appears before the @ symbol?
|
User name
|
|
What part of an e-mail address appears after the @ symbol?
|
Domain name
|
|
For which of the following tasks can you use a Mail User Agent (MUA)?
|
To send e-mail messages
|
|
Which of the following can be considered a drawback of SMTP authentication?
|
There is a greater chance that a hacker can use a packet sniffer to obtain a valid user name and password.
|
|
Which of the following can be considered an advantage of Web-based e-mail?
|
You can log on and check your e-mail from any computer that has Internet access.
|
|
In order to send an e-mail message, you must include:
|
An address in the To field
|
|
What is the term for a file that is sent with an e-mail message?
|
Attachment
|
|
By default, e-mail clients typically save a copy of every message you send in:
|
The Sent or Sent Items folder
|
|
What is an e-mail signature?
|
Text that appears at the bottom of each message you send that contains your contact information
|
|
In which of the following components should you store names and information for your frequently accessed e-mail contacts?
|
Address book
|
|
How do most current e-mail clients display an attachment in an e-mail message?
|
As a separate link, such as an icon
|
|
What must an e-mail message recipient possess in order to view a file attachment?
|
The software necessary to open or edit the attached file
|
|
If your organization scans e-mail attachments to ensure that they contain no malicious code, where does the scanning take place?
|
At the e-mail server
|
|
What can administrators use to filter out the IP addresses of known spammers?
|
Blackhole list
|
|
What is a disadvantage of using Web-based e-mail?
|
Your user name and password reside on a third-party server.
|
|
What e-mail feature was designed for users with dial-up accounts who want to work offline and accumulate messages, then connect to the Internet and send all their queued messages at once?
|
Outbox folder
|
|
When you use an e-mail client to send and receive mail:
|
Messages stored in your Outbox are sent, a copy of each sent message is stored in the Sent Items folder, and incoming messages are routed to your Inbox
|
|
What would closed-envelope (or similar) icons in an Inbox's Message list represent?
|
Unread messages
|
|
What e-mail response option should you use to respond only to the original sender of an e-mail message?
|
Reply
|
|
What e-mail response option should you use to respond to the original sender of an e-mail message and include everyone who was copied
|
Reply All
|
|
What e-mail response option should you use to send an e-mail message to users who did not receive the original?
|
Forward
|
|
The appearance of right-pointing angle brackets (>) in the text of an e-mail message indicates that the message contains:
|
Forwarded text
|
|
The term "netiquette" refers to:
|
General rules for Internet politeness
|
|
Using all capital letters in an e-mail message connotes:
|
Shouting or anger
|
|
Why would you use emoticons in an e-mail message?
|
To help convey the intended tone of the message
|
|
What is the term for a combination of characters that you read sideways that helps convey emotion in an e-mail message?
|
Emoticon
|
|
What is an e-mail thread?
|
An e-mail message that includes information from the original e-mail message in a response
|
|
Why should you use out-of-office messages when you will be out of the office for an extended period of time?
|
To explain why you may not respond to e-mail messages within a reasonably short period of time
|
|
What is the term for the feature in an e-mail client that automatically sends a specified response to anyone who sends e-mail to your address?
|
Autoresponder
|
|
Which of the following is an appropriate use of e-mail in a business environment?
|
Discussing the status of a project with co-workers
|
|
What is the term for unsolicited and unwanted e-mail messages?
|
Spam
|
|
What is the term for an SMTP server that allows the third-party relay of e-mail messages that spammers use to send spam?
|
Open relay
|
|
What can be used to detect automated systems used by spammers for registering e-mail accounts?
|
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
|
|
What client-side actions can you take to reduce the amount of spam you receive?
|
Set up a spam filter in your e-mail client to filter out spam messages
|
|
Why is having local access to e-mail messages important for those who use IMAP servers?
|
If a network problem occurs, IMAP server users may not have access to their messages
|
|
For what would you use a personal information management (PIM) program?
|
To schedule appointments and meetings, store contact information, and manage tasks
|
|
What device can you use with personal information management (PIM) software to synchronize appointments and contact information that you keep on your desktop or laptop computer?
|
A smartphone
|