PLEASE answer carefully as this question will come to my test so dont give me wrong answer if your not 100% sure. Thank You 1) A malicious user sends a flood of email to the email server -- essentially, an email-based denial of service attack. This is called a) email combing b) denial of mail service attack c) mail bombing d) EDoS attack 2) ______________ are collections of IP addresses of known spam sources on the Internet and they can be easily integrated into most SMTP server configurations. a) RBLs b) NMBs c) IP reservers d) IP database reserve 3) FTP-transmitted data is sent in _________. a) plaintext b) WEB encrypted text c) RSA encrypted text d) PGP encrypted 4) You should not allow external users to query internal DNS servers: True or Flase? True or False 5) You should disable _____________query ability to avoid DoS attacks on the DNS server. a) recursive b)accursed c) repetitive d) none of the above 6) You should limit _______________ transfers to trusted IP addresses. a) address b) attribution c) zone d) encryption 7) Use _________________ lists to indicate which type of data is acceptable and discard the rest. a) black b) white c) accurate d) Elven-generated 8) Use ____________________ authentication where you use multiple methods such as tokens to replace simple username and password combinations. a) 2 factor b) 1 factor c) diverse d) Jedi Solution 1) D 2) A 3) A 4) False. 5) C 6) C 7) C 8) A .