The SMTP server listens on port number ____.25The current version of IMAP is ____.
IMAP4E-mail ____ are documents that are connected to an e-mail message, such as word processing documents, spreadsheets, or pictures.Attachments____ is a scripting language that does not create standalone applications.Javascript____ is a complete programming language that can be used to create stand-alone applications.JavaA(n) ____ is a program that does not come from a trusted source.Unsigned Java AppletUnsigned Java applets run in a security ____, which is like a fence that surrounds the program and keeps it away from private data and other resources on a local computer.Sandbox
____ represent a specific way of implementing ActiveX and are sometimes called ActiveX applications.Actie x controlsActiveX controls can be invoked from Web pages through the use of a ____ or directly by an HTML command.Scripting LanguageKnown as ____, the deleted cookie’s unique ID can still be assigned to a new cookie using the data stored in a Flash cookie as a backup.Respawning____ is a technology that can associate a user’s identity to a public key, in which the user’s public key has been “digitally signed” by a trusted third party.A digital certificate____ look for specific words and block e-mail messages containing those words.Spam Filters____ uses graphical images of text in order to circumvent text-based filters.Image SpamA(n) ____ is a business from which users purchase Internet access.Internet service providerMost e-mail clients contain a ____ that allows the user to read an e-mail message without actually opening it.Reading PaneIdentifies the program or service that is being requestedPort NumberA file used to store user-specific information on the user’s local computer and then retrieve it laterCookieAn HTML element that allows for one HTML document to be embedded inside the main documentiFrameSent the first e-mail message in 1971Ray TomlinsonAutomatically blocks over 80 different types of file attachments that may contain malwareMicrosoft OutlookThe standard port for HTTP transmissionsPort 180A list of senders for which the user does not want to receive any e-mailBlacklistA list of senders for which the user will accept e-mailWhitelistHelps to protect the user from malicious code that may be embedded in the attachment because scripts and ActiveX controls are disabled during this processPreview AttachmentsWhat can be used to run Java Script in a restricted environment and limit what resources it can access?Only permitting JavaScript to run in a restricted environment ("sandbox") can limit what computer resources it can access or actions it can take.
What is it called when unsuspecting users visit an infected website and their browsers download code that targets a vulnerability in the users browser?What is it called when unsuspecting users visit an infected website and their browsers download code that targets a vulnerability in the user's browser? Extensions. 14. Which of the following expands the normal capabilities of a web broswer for a specific webpage? Private Browsing.
What do web servers use to track whether a user has previously visited a web site?HTTP cookies (also called web cookies, Internet cookies, browser cookies, or simply cookies) are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
What is a worldwide set of interconnected computers servers and networks?Internet. a worldwide set of interconnected computers, servers, and networks. Internet service provider (ISP)
|