Chapter 12
Self Test
1. A(n) ____ architecture comprises one central server and several connected client computers.
2. The ____ of an e-mail message contains unique identifying numbers, such as the IP address of the server that sent the message.
3. E-mail crimes and violations depend on the city, state, and sometimes country in which the e-mail originated. (True/False)
4. Network administrators maintain logs of the inbound and outbound traffic that routers handle. (True/False)
5. ____ logging saves valuable server space.
6. Novell NetWare’s e-mail service, ____, stores user messages in up to 25 proprietary databases.
7. Some e-mail systems store messages using flat plaintext files, known as a(n) ____ format.
8. Vendor-unique e-mail file systems, such as Microsoft .pst or .ost, typically use ____ formatting.