Cyber Security Questions and Answers | Cyber Security MCQs and Answers

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
1 What is IMAP?
A Internet Messaging Application
B Interanet Messaging Application
C Interanet Message Access Protocol
D Internet Message Access Protocol

Answer: Internet Message Access Protocol
2 Which of the following are threats to Email Security?
A Viruses
B Trojans
C Spams
D Phishing
E All of the above

Answer: All of the above
Advertisement
Article and Schedule Quiz Start Test!
DOWNLOAD CURRENT AFFAIRS PDF FROM APP
3 Which of the following symmetric encryption algorithms is/are supported by S/MIME?
A RSA
B DES
C 3DES
D SHA-1

Answer: RSA
4 Which of the following are the disadvantages of verification?
A More complications
B Increased internet traffic
C Problems in sending valid bulk mails
D Insecurity against social engineering.
E All of the above

Answer: All of the above
5 How many antivirus programs should be installed on a single system?
A 1
B 2
C 3
D 4

Answer: 1
6 Which of the following are indirect harms caused by spam?
A Malicious payload
B Fraud
C Loss of reputation
D Increased communication costs

Answer: Loss of reputation
7 Which of the following are the benefits reaped from spam by those associated with antispam measures?
A Antispam software sales
B Antivirus software sales
C Increased revenue from advertising
D Bandwidth sales

Answer: Antispam software sales
8 What does "RBL" stands for in Email Security?
A Realtime Blacking List
B Realtime Blocking List
C Realtime Blockhole List
D Realtime Blackhole List

Answer: Realtime Blackhole List
9 Dave is fetching mails from a server lying at a remote location. Which protocol is he using to fetch the mails?
A SMTP
B HTTP
C SSL
D POP3

Answer: POP3
10 Which of the following are different types of spam filtering methods?
A Blacklisting
B Rule based filtering
C Signature based filtering
D Bayesian filtering
E All of the above

Answer: All of the above
11 Which of the following is used in a Directory Harvest Attack?
A Worms
B Brute Force
C
D Trojans

Answer: Brute Force
12 Which of the following resembles the Joe Job attack?
A A virus outbreak on the mail server
B Finding valid/existent email addresses
C Crashing of the mail server
D A spam attack that uses spoofed sender data and tarnishes the apparent sender's reputation

Answer: A spam attack that uses spoofed sender data and tarnishes the apparent sender's reputation
13 Which of the following is an asymmetric algorithm?
A MD5
B El Gamal
C IDEA
D SHA-1

Answer: El Gamal
14 Which of the following is used to entangle spammers?
A MDA
B Spam mails
C Trojans
D Honey pots

Answer: Honey pots
15 Which of the following protocols is used on the sender side when an electronic mail is sent from one host to another?
A SMTP
B POP3
C HTTP
D TLS

Answer: SMTP
16 Which of the following techniques are used to identify spam mails?
A Blacklists/Whitelists
B Integrity Check
C Heuristics
D Content Filtering
E Reverse DNS lookup
F All of the above

Answer: All of the above
17 Which of the following actions can be taken while filtering POP3 spam traffic?
A Delete the spam mail
B Redirect it to the spam mail box
C Return it to the sender.
D Tag the spam mail

Answer: Redirect it to the spam mail box
18 Which of the following is used to control zombies?
A Viruses
B Worms
C Trojan horses
D Spam mails

Answer: Trojan horses
19 Which of the following are malicious code attacks?
A Brute
B force
C Trojan
D Malware

Answer: Malware
20 Which of the following programs is used by a user to send and receive emails?
A Mail Transfer Agent
B Mail Delivery Agent
C Mail User Agent
D Mail Reading Agent

Answer: Mail User Agent

Random GK Questions

Assam Direct Recruitment Test Series

Teacher Eligibility Test

Assam Direct Recruitment Test Series