When information is temporarily kept at one or more middle points during transmission, that technique is called ________ communication.
Which of the following describes multiple points of presence (MPOP)?
Phishing and social engineering are threats encountered when using ________.
Messaging or chatting on social networking sites can be considered very private and secure.
What is the meaning of the term “spam”?
Which of the following is true concerning store-and-forward communication?
Which one of the following is also known as CEO fraud?
SMS and MMS are primarily the same service apart from the addition of multimedia with MMS.
Protocols such as SIP, H.323, MGCP, IP, and RTP are encountered when discussing which of the following?
Threats to IM span risk to availability, integrity, and confidentiality.
Presence and availability is the term for the ability and willingness of an end user to engage in communication by setting instant message status to “available” or “in office.”
SIP controls either unicast or multicast sessions.