Describe an open relay.

What will be an ideal response?

Another major attack involving an SMTP server occurs when an e-mail server administrator does not restrict who can use the SMTP server to send e-mail. This type of configuration is referred to as an open relay. Attackers will scan the Internet looking for open relays that they can use to send spam. This allows the attackers to use the e-mail system to send e-mail anonymously. In the case of worms, malicious software can also use the open relay to propagate itself across the Internet.

Computer Science & Information Technology

You might also like to view...

A document printed using ________ orientation is taller than it is wide

A) justified B) landscape C) paragraph D) portrait

Computer Science & Information Technology

Recursion is memory-intensive because:

a. Recursive functions tend to declare many local variables. b. Previous function calls are still open when the function calls itself and the activation records of these previous calls still occupy space on the call stack. c. Many copies of the function code are created. d. It requires large data values.

Computer Science & Information Technology