GkSeries.com

Cyber Security Questions and Answers | Cyber Security MCQs and Answers

(1) What is IMAP?
[A] Internet Messaging Application
[B] Interanet Messaging Application
[C] Interanet Message Access Protocol
[D] Internet Message Access Protocol
Answer: Internet Message Access Protocol
(2) Which of the following are threats to Email Security?
[A] Viruses
[B] Trojans
[C] Spams
[D] Phishing
E All of the above
Answer: All of the above

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

(3) Which of the following symmetric encryption algorithms is/are supported by S/MIME?
[A] RSA
[B] DES
[C] 3DES
[D] SHA-1
Answer: RSA
(4) Which of the following are the disadvantages of verification?
[A] More complications
[B] Increased internet traffic
[C] Problems in sending valid bulk mails
[D] Insecurity against social engineering.
E All of the above
Answer: All of the above
(5) How many antivirus programs should be installed on a single system?
[A] 1
[B] 2
[C] 3
[D] 4
Answer: 1
(6) Which of the following are indirect harms caused by spam?
[A] Malicious payload
[B] Fraud
[C] Loss of reputation
[D] Increased communication costs
Answer: Loss of reputation
(7) Which of the following are the benefits reaped from spam by those associated with antispam measures?
[A] Antispam software sales
[B] Antivirus software sales
[C] Increased revenue from advertising
[D] Bandwidth sales
Answer: Antispam software sales
(8) What does "RBL" stands for in Email Security?
[A] Realtime Blacking List
[B] Realtime Blocking List
[C] Realtime Blockhole List
[D] Realtime Blackhole List
Answer: Realtime Blackhole List
(9) Dave is fetching mails from a server lying at a remote location. Which protocol is he using to fetch the mails?
[A] SMTP
[B] HTTP
[C] SSL
[D] POP3
Answer: POP3
(10) Which of the following are different types of spam filtering methods?
[A] Blacklisting
[B] Rule based filtering
[C] Signature based filtering
[D] Bayesian filtering
E All of the above
Answer: All of the above
(11) Which of the following is used in a Directory Harvest Attack?
[A] Worms
[B] Brute Force
[C]
[D] Trojans
Answer: Brute Force
(12) Which of the following resembles the Joe Job attack?
[A] A virus outbreak on the mail server
[B] Finding valid/existent email addresses
[C] Crashing of the mail server
[D] A spam attack that uses spoofed sender data and tarnishes the apparent sender's reputation
Answer: A spam attack that uses spoofed sender data and tarnishes the apparent sender's reputation
(13) Which of the following is an asymmetric algorithm?
[A] MD5
[B] El Gamal
[C] IDEA
[D] SHA-1
Answer: El Gamal
(14) Which of the following is used to entangle spammers?
[A] MDA
[B] Spam mails
[C] Trojans
[D] Honey pots
Answer: Honey pots
(15) Which of the following protocols is used on the sender side when an electronic mail is sent from one host to another?
[A] SMTP
[B] POP3
[C] HTTP
[D] TLS
Answer: SMTP
(16) Which of the following techniques are used to identify spam mails?
[A] Blacklists/Whitelists
[B] Integrity Check
[C] Heuristics
[D] Content Filtering
E Reverse DNS lookup
F All of the above
Answer: All of the above
(17) Which of the following actions can be taken while filtering POP3 spam traffic?
[A] Delete the spam mail
[B] Redirect it to the spam mail box
[C] Return it to the sender.
[D] Tag the spam mail
Answer: Redirect it to the spam mail box
(18) Which of the following is used to control zombies?
[A] Viruses
[B] Worms
[C] Trojan horses
[D] Spam mails
Answer: Trojan horses
(19) Which of the following are malicious code attacks?
[A] Brute
[B] force
[C] Trojan
[D] Malware
Answer: Malware
(20) Which of the following programs is used by a user to send and receive emails?
[A] Mail Transfer Agent
[B] Mail Delivery Agent
[C] Mail User Agent
[D] Mail Reading Agent
Answer: Mail User Agent

Please share this page

Click Here to Read more questions

Teacher Eligibility Test