Download PDF
Free download in PDF Cyber Security Multiple Choice Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams like UPSC, NDA, SSC etc. These short solved questions or quizzes are provided by Gkseries./p>
(1)
What is IMAP?
[A]
Internet Messaging Application
[B]
Interanet Messaging Application
[C]
Interanet Message Access Protocol
[D]
Internet Message Access Protocol
Answer: Internet Message Access Protocol
(2)
Which of the following are threats to Email Security?
[A]
Viruses
[B]
Trojans
[C]
Spams
[D]
Phishing
E
All of the above
(3)
Which of the following symmetric encryption algorithms is/are supported by S/MIME?
[A]
RSA
[B]
DES
[C]
3DES
[D]
SHA-1
(4)
Which of the following are the disadvantages of verification?
[A]
More complications
[B]
Increased internet traffic
[C]
Problems in sending valid bulk mails
[D]
Insecurity against social engineering.
E
All of the above
(5)
How many antivirus programs should be installed on a single system?
(6)
Which of the following are indirect harms caused by spam?
[A]
Malicious payload
[B]
Fraud
[C]
Loss of reputation
[D]
Increased communication costs
Answer: Loss of reputation
(7)
Which of the following are the benefits reaped from spam by those associated with antispam measures?
[A]
Antispam software sales
[B]
Antivirus software sales
[C]
Increased revenue from advertising
[D]
Bandwidth sales
Answer: Antispam software sales
(8)
What does "RBL" stands for in Email Security?
[A]
Realtime Blacking List
[B]
Realtime Blocking List
[C]
Realtime Blockhole List
[D]
Realtime Blackhole List
Answer: Realtime Blackhole List
(9)
Dave is fetching mails from a server lying at a remote location. Which protocol is he using to fetch the mails?
[A]
SMTP
[B]
HTTP
[C]
SSL
[D]
POP3
(10)
Which of the following are different types of spam filtering methods?
[A]
Blacklisting
[B]
Rule based filtering
[C]
Signature based filtering
[D]
Bayesian filtering
E
All of the above
(11)
Which of the following is used in a Directory Harvest Attack?
[A]
Worms
[B]
Brute Force
[C]
[D]
Trojans
(12)
Which of the following resembles the Joe Job attack?
[A]
A virus outbreak on the mail server
[B]
Finding valid/existent email addresses
[C]
Crashing of the mail server
[D]
A spam attack that uses spoofed sender data and tarnishes the apparent sender's reputation
Answer: A spam attack that uses spoofed sender data and tarnishes the apparent sender's reputation
(13)
Which of the following is an asymmetric algorithm?
[A]
MD5
[B]
El Gamal
[C]
IDEA
[D]
SHA-1
(14)
Which of the following is used to entangle spammers?
[A]
MDA
[B]
Spam mails
[C]
Trojans
[D]
Honey pots
(15)
Which of the following protocols is used on the sender side when an electronic mail is sent from one host to another?
[A]
SMTP
[B]
POP3
[C]
HTTP
[D]
TLS
(16)
Which of the following techniques are used to identify spam mails?
[A]
Blacklists/Whitelists
[B]
Integrity Check
[C]
Heuristics
[D]
Content Filtering
E
Reverse DNS lookup
F
All of the above
(17)
Which of the following actions can be taken while filtering POP3 spam traffic?
[A]
Delete the spam mail
[B]
Redirect it to the spam mail box
[C]
Return it to the sender.
[D]
Tag the spam mail
Answer: Redirect it to the spam mail box
(18)
Which of the following is used to control zombies?
[A]
Viruses
[B]
Worms
[C]
Trojan horses
[D]
Spam mails
(19)
Which of the following are malicious code attacks?
[A]
Brute
[B]
force
[C]
Trojan
[D]
Malware
(20)
Which of the following programs is used by a user to send and receive emails?
[A]
Mail Transfer Agent
[B]
Mail Delivery Agent
[C]
Mail User Agent
[D]
Mail Reading Agent
Please share this page