How might this policy differ from you file backups policy

Assignment Help Management Information Sys
Reference no: EM131420370

Chapter 41 : The Practice of System and etwork Administration By Thomas A.Limoncelli,Christina J.Hogan,Strata R.Chalup

Submit your responses to these exercises. For credit:

- Repeat each question above each response

- Answer in your own words, and reference sources

E20.1a. Briefly describe the difference between a user agent (MUA), a delivery agent (DA), and an access agent (AA).

E20.1b. Briefly describe the difference between a mail transport agent (MTA) and a mail submission agent (MSA).

X1. Explain the apparent namespace policies for WOU student and faculty/staff email addresses. (Note these may differ.)

X2. Our lecture includes a reference design for an email system. With about that level of detail as a guide, research and find several more reference designs, comparable or simpler or more complex. Give a reference to what you find (e.g. a web link plus further detail) AND submit a screenshot or document (as a JPEG or PDF file) of the reference design.

13. How might you implement a six-month retention schedule for email backups? Would you need to include client systems in this policy?

How might this policy differ from you file backups policy? Explain.

E20.6. Research the purpose and format of an email header. Then study the following email headers. Explain: What path did the email take? To whom was it addressed, and to whom was it delivered? How long did it spend in transit?

Delivered-To: [email protected]

Received: by 10.231.143.81 with SMTP id t17cs175323ibu;

Mon, 28 Dec 2009 20:15:20 -0800 (PST) Received: by 10.231.157.131 with SMTP id

b3mr2134004ibx.19.1262060119841;

Mon, 28 Dec 2009 20:15:19 -0800 (PST)

Return-Path: <[email protected]>

Received: from mail-relay.atrust.com (mail-relay.atrust.com
[63.173.189.2]) by mx.google.com with ESMTP id 12si19092249iwn.27.2009.12.28.20.15.19;
Mon, 28 Dec 2009 20:15:19 -0800 (PST)

Received-SPF: neutral (google.com: 63.173.189.2 is neither permitted nor denied by best guess record for domain of [email protected]) client- ip=63.173.189.2;

Authentication-Results: mx.google.com; spf=neutral (google.com: 63.173.189.2 is neither permitted nor denied by best guess record for domain of [email protected]) [email protected]

Received: from mout.perfora.net (mout.perfora.net [74.208.4.194]) by mail-relay.atrust.com (8.12.11/8.12.11) with ESMTP id nBT4FI9r017821 for <[email protected]>; Mon, 28 Dec 2009 21:15:19 -0700

Received: from grsweb.us (wolverine.dreamhost.com [75.119.201.185]) by mrelay.perfora.net (node=mrus1) with ESMTP (Nemesis) id 0Ma0RD- 1NgKS52KT9-00LeuN; Mon, 28 Dec 2009 23:15:17 -0500

Date: Mon, 28 Dec 2009 20:15:13 -0800

From: UNIX and Linux System Administration Handbook

<[email protected]>

Reply-To: [email protected]

To: [email protected]

Cc: [email protected]

Message-Id: <[email protected]> Subject: New comments on Printing

Mime-Version: 1.0

Content-Type: text/html; charset=utf-8

X-Provags-ID:

V01U2FsdGVkX18pouiYXif/bVfh+D9wFXMr24TahAzDNZqM+jA04iLR7S4 olDXRpXlrbQMblNoZf5jO6edc+WIGC8Fi4hd5Ak15vBARASOFQYxNJWea9 8SyQg==

X-Spam-Status: No, hits=-99.3 required=4.0 tests=BAYES_30,HTML_20_30, MIME_HTML_ONLY,USER_IN_WHITELIST version=2.55

X-Spam-Level:

X-Spam-Checker-Version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp)

Reference no: EM131420370

Questions Cloud

Changing circumstances and demographics of war : Scholars are divided on whether the Holocaust was planned from the rise of the Nazis in 1933 or was a response to the changing circumstances and demographics of war? Which do you think is the correct interpretation and why?
What is the name of the machine tool used in the operations : what is the name of the machine tool used in the operations?
Analyze the benefits and risks of information technology : Write a 1,050- to 1,400-word report to the city of Kelsey. Convince the city officials that their city has unmet IT needs and how your firm can satisfy these needs. Analyze the benefits and risks of information technology
African ancestry challenge white supremacy : According to the reading, how did people of African ancestry challenge white supremacy? Please be specific. How did middle-class and prosperous people of African ancestry try to contribute to progress for their race? Were their efforts effective?
How might this policy differ from you file backups policy : Our lecture includes a reference design for an email system. With about that level of detail as a guide, research and find several more reference designs, comparable or simpler or more complex. Give a reference to what you find (e.g. a web link ..
Find horsepower to perform the operation : Rod stock that has an initial diameter of 0.50 in is drawn through a draw die with an entrance angle of 13°. The final diameter of the rod is = 0.375 in. The metal has a strength coefficient of 40,000 lb/in2 and a strain hardening exponent of 0.20...
Describe the difference between morals ethics and law : Address the following points in your analysis: Define ethics and discuss why it is important. Describe the difference between morals, ethics, and law and Discuss some common forms of employee misconduct
Find length of the extruded section : An L-shaped structural section is direct extruded from an aluminum billet in which Lo = 250 mm and Do= 88 rnm. Dimensions of the cross section are given in Figure P19.29. Die angle = 90°.
Represents the civilization of new england egypt : Do you think Hatsheput or ahenaten better represents the civilization of new england egypt? Before you decide, describe both rulers and new kingdom egypt?

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Important information about right to privacy

Important information about right to privacy - What are the limits to an employee's right to privacy at work in regards to telecommunications and information?

  Improvement of the accounting information system

What kind of obstacles would you expect to have in communications between IT developers and accountants regarding development or improvement of the accounting information system

  Determine the optimal order quantity

A toy manufacturer uses approximately 32,000 silicon chips annually. - Determine The optimal order quantity. - Determine The number of workdays in an order cycle.

  Explain how wireless technology changed your quality of life

How has wireless technology changed your quality of life or your work environment? How are wireless technologies used by organizations to form a communication channel with clients?

  The design of user interfaces is of critical importance in

the design of user interfaces is of critical importance in systems analysis and design. discuss.word limit 700

  Describe how the organization''s policies

Describe how the organization's policies and standards would be administered to meet the key requirements of accepted industry standards.

  Different sources can be usefully aggregated

What are the different ways in which data from different sources can be usefully aggregated?

  List and briefly describe the four parts of typical e-mails

List and briefly describe the four parts of typical e-mails. Suggest at least ten pointers that you could give to a first-time e-mail user.

  Explain the digital crime thoery

Explain the manner in which the theory that you selected in Question 1 relates to crime in general.Determine one (1) additional theory that a researcher could use to explain the cause of digital-crime and non-digital crime. Include one (1) example ..

  Discuss about the impact of malware

From the second e-Activity, explain whether or not you believe that the myth of Mac devices being more secure than Windows devices is becoming history, and justify your answer. Further, indicate one (1) main reason why you believe this myth still ..

  Description of oracle key erp systems

Oracle provides ERP solutions for mid-size business organizations. For this assignment, you are to write a research report on these ERP solutions.

  Itpm w5 indv projectprepare a complete risk mitigation and

itpm w5 indv. projectprepare a complete risk mitigation and management plan rmmm for hisher projects including a task

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd