GkSeries.com

Cyber Security Objective Questions and Answers | Cyber Security MCQs and Answers

(1) Which of the following are the ways through which virus spreads?
[A] Floppy Disk
[B] CD
[C] Email attachments
[D] Network connection
E All of the above
Answer: All of the above
(2) Which of the following are categories of spam mails?
[A] Phishing and Fraud
[B] Spoofing mails
[C] Hoaxes
[D] Chain mails
E All of the above
Answer: All of the above

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

(3) Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:
[A] Negative detection
[B] False positive
[C] False negative
[D] Untrue detection
Answer: False negative
(4) Which of the following are preventive antivirus measures?
[A] Do not open attachments from suspicious sources.
[B] Delete chain and junk mails.
[C] Exercise caution while downloading from the internet
[D] Backup your files.
E All of the above
Answer: All of the above
(5) Which of the following ports is used by IMAP?
[A] 139
[B] 143
[C] 142
[D] 25
Answer: 143
(6) What are zombies?
[A] Antispam solutions.
[B] Remotely controlled hosts.
[C] Antivirus solutions
[D] Hackers
Answer: Remotely controlled hosts.
(7) How many keys are required if two parties communicate using Asymmetric Cryptography?
[A] One
[B] Two
[C] Three
[D] Four
Answer: Two
(8) How many keys are required if two parties communicate using Asymmetric Cryptography?
[A] One
[B] Two
[C] Three
[D] Sasser Worm
E Four
Answer: Two
(9) Which of the following programs establishes modem connection with payper-visit resources?
[A] Trojans
[B] Automatic dialers
[C] Worms
[D] Antivirus
Answer: Automatic dialers
(10) What is Phishing?
[A] Fraudulently acquiring sensitive information.
[B] An encryption technique
[C] An anti-spam technique
[D] A password building technique
Answer: Fraudulently acquiring sensitive information.
(11) Which of the following are direct harms caused by spam?
[A] Loss of productivity
[B] Increased staff costs
[C] Increased infrastructure costs
[D] Increased downloading costs
E All of the above
Answer: All of the above
(12) Which of the following is the Hashing Algorithm?
[A] AES
[B] 3-DES
[C] DES
[D] MD5
Answer: MD5
(13) Which key is used to decrypt the message in PKI?
[A] Public Key.
[B] Private Key.
[C] Pre-shared Secret Key.
[D] Hybrid Key.
Answer: Private Key.
(14) What is Joe Job?
[A] A virus
[B] An antivirus
[C] A spam attack
[D] An antispam
Answer: A spam attack
(15) Which of the following are Email Security Protocols?
[A] S/MIME
[B] PEM
[C] STE
[D] PME
Answer: S/MIME
(16) Which of the following symmetric algorithms have variable key length?
[A] AES
[B] Triple DES
[C] IDEA
[D] Rivest Cipher
Answer: Rivest Cipher
(17) What is Mail Exchanger(MX) Record? Router route.
[A] Record in router.
[B] Record in DNS specifying the internet email route.
[C] Record in DNS specifying the internet email route.
[D] Record in DHCP specifying the email route
Answer: Record in DNS specifying the internet email route.
(18) Which of the following measures should be taken to tackle spam mails?
[A] Blocking and accepting on the basis of MTA IP address
[B] Limiting the number of outgoing e-mails per account
[C] Authentication mechanisms
[D] Spam filtering.
E All of the above
Answer: All of the above
(19) Which of the following are different categories of viruses?
[A] Parasitic
[B] Bootstrap sector
[C] Companion
[D] All of the above
Answer: All of the above
(20) What is the function of the Reverse DNS Look up Technique in identifying spam mails?
[A] To check the sender's email server attempting for spoofing
[B] To check the receiver's email server attempting for spoofing
[C] To check the DNS server validity
[D] None of these
Answer: To check the DNS server validity

Please share this page

Click Here to Read more questions

Teacher Eligibility Test