Describe the mail access vulnerability.

What will be an ideal response?


Many of the popular Web-based e-mail applications only allow you to access e-mail with hypertext transfer protocol (HTTP) instead of HTTP over SSL (HTTPS). This plaintext e-mail retrieval mechanism using HTTP enables any eavesdropper in the network to read e-mail messages. Furthermore, an e-mail server can configured to require POP and IMAP with authentication. These protocols require that user names and passwords be sent in plaintext. As a result, any eavesdropper listening to the flow of information between your personal computer and your e-mail service provider's computer can read your messages and credentials.

Computer Science & Information Technology

You might also like to view...

If the sort pattern split routine consistently splits the array into two pieces size 1 and another of size N-1 then the run time is”

a. O(N2) b. O(log N) c. O(N1/2) d. O(N log N) e. The run-time depends on too many things to answer this.

Computer Science & Information Technology

Before running a delete query, what should you do?

A) View the results in Design view. B) Manually go through the table and delete the information, then use the delete query to verify all information is removed. C) Preview the datasheet to verify that the records are those that you intend to delete. D) Create the table, you can always delete it if the information is wrong.

Computer Science & Information Technology

The ____ method returns an integer that represents the location of the subString within the string.

A. Insert B. IndexOf C. Contains D. Substring

Computer Science & Information Technology

The ____________________ function can be used to specify the number of decimal places to be displayed for values and formulas.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology