GkSeries.com

Cyber Security Questions and Answers | Cyber Security MCQs and Answers

(1) Which of the following actions can be taken while filtering SMTP spam traffic?

1. Delete the spam mail

2. Redirect it to the spam mail box

3. Return it to the sender.

4. Tag the spam mail

[A] 1, 2, 3
[B] 1,2
[C] 1,2,4
[D] 3
Answer: 1,2,4
(2) Which of the following files are mostly infected?

1. .DOT

2. .EXE

3. .COM

4. .TXT

[A] 1,2,3
[B] 3,4
[C] 2,3
[D] 4
Answer: 1,2,3

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

(3) What is the function of MTA(Mail Transfer Agent)?
[A] It helps in reading the emails
[B] It receives and delivers the messages
[C] It resolves the names
[D] It detects emails carrying virus
Answer: It receives and delivers the messages
(4) What is DHA?
[A] Directory Harvest Attack
[B] DNS Harvest Attack
[C] Direct Harvest Attack
[D] Dictionary Harvest Attack
Answer: Directory Harvest Attack
(5) How many keys are required if two parties communicate using Symmetric Cryptography?
[A] One
[B] Two
[C] Three
[D] Four
Answer: One
(6) What is S/MIME?
[A] Secure Multipurpose Intranet Mail Extensions
[B] Secure Multipurpose Internet Mail Extensions
[C] Secure Multipurpose Internet Message Extensions
[D] Secure Multipurpose Intranet Message Extensions
Answer: Secure Multipurpose Internet Mail Extensions
(7) Which of the following anti-spam measures are taken to reduce spam?
[A] Legislative measures
[B] Organizational measures
[C] Behavioral measures Technological measures.
[D] All of the above
Answer: All of the above
(8) Which of the following are famous worm attacks?
[A] MyDoom Worm
[B] Bagle Worm
[C] Netsky Worm
[D] Sasser Worm
E All of the above
Answer: All of the above
(9) Which of the following techniques are used by spammers to find valid/existent email addresses?
[A] SMTP spoofing
[B] SMTP poisioning
[C] DNS poisioning
[D] Directory Harvest Attack
Answer: Directory Harvest Attack
(10) Daniel has deployed an antispam solution in his network. Positive detection of non-spam SMTP is called:
[A] Negative detection
[B] False positive detection
[C] False negative detection
[D] Untrue detection.
Answer: False positive detection
(11) Which of the following techniques helps in cases of address forgery?
[A] SMTP extensions
[B] Cryptographic authentication
[C] Path authentication
[D] Hybrid authentication
Answer: Path authentication
(12) Which of the following types of virus lives in the boot sector?
[A] Sector virus
[B] Parasitic virus
[C] boot sector
[D] virus Bootable virus
Answer: boot sector
(13) Which of the following is the Symmetric Algorithm used in cryptography?
[A] MD4
[B] El Gamal
[C] IDEA
[D] RSA
Answer: El Gamal
(14) Suppose you got a mail from someone saying that you have won a $1 billion and asking you to give him/her $4000 to claim your prize. Under which category does this type of spam mail lie?
[A] Phishing and Fraud
[B] Spoofing mails
[C] Hoaxes
[D] Chain mails
Answer: Phishing and Fraud
(15) What is botnet?
[A] A software that runs automatically and autonomously.
[B] A software used for antispam
[C] A software used to manage MTA
[D] A software used to manage MDA
Answer: A software that runs automatically and autonomously.
(16) Which of the following goals cannot be achieved with the help of Symmetric Cryptography?
[A] Nonrepudiation
[B] Confidentiality
[C] Integrity
[D] Availability.
Answer: Availability.
(17) To which of the following components does the MUA(Mail User Agent) forward the mail while sending it to another host in the e-mail flow?
[A] Mail User Agent
[B] Firewall
[C] Router
[D] Mail Transfer Agent
Answer: Mail Transfer Agent
(18) What is the maximum key length of AES?
[A] 56
[B] 156
[C] Variable
[D] 256
Answer: 256
(19) Which of the following are disadvantages of the Symmetric Key Cryptography?
[A] Nonrepudiation
[B] Scalability
[C] Key distribution
[D] Security
Answer: Key distribution
(20) What are the Measures to be Adopt for Best Virus Protection? Use of Antivirus.
[A] Use of Firewall.
[B] Keeping Software updated.
[C] Download only trusted programs.
[D] Be cautious about Phishing and Social Engineering.
E Be wise with Passwords. All Of the Above
F All Of the Above
Answer: All Of the Above

Please share this page

Click Here to Read more questions

Teacher Eligibility Test