Describe the inter-mail server vulnerability.
What will be an ideal response?
All e-mail servers communicate with each other using SMTP. However, by the nature of the protocol, there is no reliable way to know when an e-mail message will actually be delivered to a recipient. The primary and/or secondary server might be down, and the message may sit in queues in any number of servers for any amount of time before delivery. E-mail messages are stored in plain, unencrypted text on SMTP servers. Any person who has appropriate access to a SMTP server can read e-mail messages. SMTP servers also communicate with each other in plaintext; thus, any eavesdropper on the network can potentially sniff out e-mail message content. Furthermore, an SMTP server can be configured to request user names and passwords to authenticate in order to relay messages to other servers. These user names and passwords are also sent in plaintext and are subject to eavesdropping.
You might also like to view...
Which of the following statements will close the output file associated with the object AnsFile?
A. close.AnsFile; B. "myanswers.txt".close; C. AnsFile.close(); D. AnsFile.close("myanswers.txt " );
Variable names are usually verbs because they describe actions.
Answer the following statement true (T) or false (F)
What type of key is used in symmetric cryptography, must be known by both parties, and is used for both encryption and decryption?
A. Ciphertext B. Shared secret C. Private key D. Public key
In terms of complexity, what is the worst-case scenario for an insertion sort?
A. O(n2) B. O(n) C. O(log2n) D. O2