CMB icon images CHAPTER 14 ASSESSMENT

  1. When information is temporarily kept at one or more middle points during transmission, that technique is called ________ communication.

  2. Which of the following describes multiple points of presence (MPOP)?

    1. Aggregating multiple email accounts to your current logged on account
    2. Aggregating presence information from multiple applications or devices
    3. Dividing voicemail to lessen the risk of eavesdropping
    4. Dividing MMS messages to separate text and graphics or video pieces
  3. Phishing and social engineering are threats encountered when using ________.

  4. Messaging or chatting on social networking sites can be considered very private and secure.

    1. True
    2. False
  5. What is the meaning of the term “spam”?

    1. Suspicious perpetration of anonymous mail
    2. Unrequested and unwanted mail or messages
    3. Spiced ham
    4. None of these is correct.
  6. Which of the following is true concerning store-and-forward communication?

    1. Best used for mass mailings
    2. Best used when both parties are not available
    3. Best used when the recipient is not available
    4. Best used when latency is low
  7. Which one of the following is also known as CEO fraud?

    1. Business Email Compromise (BEC)
    2. Spear phishing
    3. Whaling
    4. All of these are correct.
  8. SMS and MMS are primarily the same service apart from the addition of multimedia with MMS.

    1. True
    2. False
  9. Protocols such as SIP, H.323, MGCP, IP, and RTP are encountered when discussing which of the following?

    1. Email
    2. Voicemail
    3. VoIP
    4. Fax
    5. SMS
  10. Threats to IM span risk to availability, integrity, and confidentiality.

    1. True
    2. False
  11. Presence and availability is the term for the ability and willingness of an end user to engage in communication by setting instant message status to “available” or “in office.”

    1. True
    2. False
  12. SIP controls either unicast or multicast sessions.

    1. True
    2. False
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset