Download PDF
Free download in PDF Cyber Security Multiple Choice Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams like UPSC, NDA, SSC etc. These short solved questions or quizzes are provided by Gkseries./p>
(1)
Which of the following are the ways through which virus spreads?
[A]
Floppy Disk
[B]
CD
[C]
Email attachments
[D]
Network connection
E
All of the above
(2)
Which of the following are categories of spam mails?
[A]
Phishing and Fraud
[B]
Spoofing mails
[C]
Hoaxes
[D]
Chain mails
E
All of the above
(3)
Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:
[A]
Negative detection
[B]
False positive
[C]
False negative
[D]
Untrue detection
(4)
Which of the following are preventive antivirus measures?
[A]
Do not open attachments from suspicious sources.
[B]
Delete chain and junk mails.
[C]
Exercise caution while downloading from the internet
[D]
Backup your files.
E
All of the above
(5)
Which of the following ports is used by IMAP?
[A]
139
[B]
143
[C]
142
[D]
25
(6)
What are zombies?
[A]
Antispam solutions.
[B]
Remotely controlled hosts.
[C]
Antivirus solutions
[D]
Hackers
Answer: Remotely controlled hosts.
(7)
How many keys are required if two parties communicate using Asymmetric Cryptography?
[A]
One
[B]
Two
[C]
Three
[D]
Four
(8)
How many keys are required if two parties communicate using Asymmetric Cryptography?
[A]
One
[B]
Two
[C]
Three
[D]
Sasser Worm
E
Four
(9)
Which of the following programs establishes modem connection with payper-visit resources?
[A]
Trojans
[B]
Automatic dialers
[C]
Worms
[D]
Antivirus
Answer: Automatic dialers
(10)
What is Phishing?
[A]
Fraudulently acquiring sensitive information.
[B]
An encryption technique
[C]
An anti-spam technique
[D]
A password building technique
Answer: Fraudulently acquiring sensitive information.
(11)
Which of the following are direct harms caused by spam?
[A]
Loss of productivity
[B]
Increased staff costs
[C]
Increased infrastructure costs
[D]
Increased downloading costs
E
All of the above
(12)
Which of the following is the Hashing Algorithm?
[A]
AES
[B]
3-DES
[C]
DES
[D]
MD5
(13)
Which key is used to decrypt the message in PKI?
[A]
Public Key.
[B]
Private Key.
[C]
Pre-shared Secret Key.
[D]
Hybrid Key.
(14)
What is Joe Job?
[A]
A virus
[B]
An antivirus
[C]
A spam attack
[D]
An antispam
(15)
Which of the following are Email Security Protocols?
[A]
S/MIME
[B]
PEM
[C]
STE
[D]
PME
(16)
Which of the following symmetric algorithms have variable key length?
[A]
AES
[B]
Triple DES
[C]
IDEA
[D]
Rivest Cipher
(17)
What is Mail Exchanger(MX) Record? Router route.
[A]
Record in router.
[B]
Record in DNS specifying the internet email route.
[C]
Record in DNS specifying the internet email route.
[D]
Record in DHCP specifying the email route
Answer: Record in DNS specifying the internet email route.
(18)
Which of the following measures should be taken to tackle spam mails?
[A]
Blocking and accepting on the basis of MTA IP address
[B]
Limiting the number of outgoing e-mails per account
[C]
Authentication mechanisms
[D]
Spam filtering.
E
All of the above
(19)
Which of the following are different categories of viruses?
[A]
Parasitic
[B]
Bootstrap sector
[C]
Companion
[D]
All of the above
(20)
What is the function of the Reverse DNS Look up Technique in identifying spam mails?
[A]
To check the sender's email server attempting for spoofing
[B]
To check the receiver's email server attempting for spoofing
[C]
To check the DNS server validity
[D]
None of these
Answer: To check the DNS server validity
Please share this page