Cyber Security Questions and Answers | Cyber Security MCQs and Answers

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
1 Which of the following actions can be taken while filtering SMTP spam traffic?

1. Delete the spam mail

2. Redirect it to the spam mail box

3. Return it to the sender.

4. Tag the spam mail

A 1, 2, 3
B 1,2
C 1,2,4
D 3

Answer: 1,2,4
2 Which of the following files are mostly infected?

1. .DOT

2. .EXE

3. .COM

4. .TXT

A 1,2,3
B 3,4
C 2,3
D 4

Answer: 1,2,3
Advertisement
Article and Schedule Quiz Start Test!
DOWNLOAD CURRENT AFFAIRS PDF FROM APP
3 What is the function of MTA(Mail Transfer Agent)?
A It helps in reading the emails
B It receives and delivers the messages
C It resolves the names
D It detects emails carrying virus

Answer: It receives and delivers the messages
4 What is DHA?
A Directory Harvest Attack
B DNS Harvest Attack
C Direct Harvest Attack
D Dictionary Harvest Attack

Answer: Directory Harvest Attack
5 How many keys are required if two parties communicate using Symmetric Cryptography?
A One
B Two
C Three
D Four

Answer: One
6 What is S/MIME?
A Secure Multipurpose Intranet Mail Extensions
B Secure Multipurpose Internet Mail Extensions
C Secure Multipurpose Internet Message Extensions
D Secure Multipurpose Intranet Message Extensions

Answer: Secure Multipurpose Internet Mail Extensions
7 Which of the following anti-spam measures are taken to reduce spam?
A Legislative measures
B Organizational measures
C Behavioral measures Technological measures.
D All of the above

Answer: All of the above
8 Which of the following are famous worm attacks?
A MyDoom Worm
B Bagle Worm
C Netsky Worm
D Sasser Worm
E All of the above

Answer: All of the above
9 Which of the following techniques are used by spammers to find valid/existent email addresses?
A SMTP spoofing
B SMTP poisioning
C DNS poisioning
D Directory Harvest Attack

Answer: Directory Harvest Attack
10 Daniel has deployed an antispam solution in his network. Positive detection of non-spam SMTP is called:
A Negative detection
B False positive detection
C False negative detection
D Untrue detection.

Answer: False positive detection
11 Which of the following techniques helps in cases of address forgery?
A SMTP extensions
B Cryptographic authentication
C Path authentication
D Hybrid authentication

Answer: Path authentication
12 Which of the following types of virus lives in the boot sector?
A Sector virus
B Parasitic virus
C boot sector
D virus Bootable virus

Answer: boot sector
13 Which of the following is the Symmetric Algorithm used in cryptography?
A MD4
B El Gamal
C IDEA
D RSA

Answer: El Gamal
14 Suppose you got a mail from someone saying that you have won a $1 billion and asking you to give him/her $4000 to claim your prize. Under which category does this type of spam mail lie?
A Phishing and Fraud
B Spoofing mails
C Hoaxes
D Chain mails

Answer: Phishing and Fraud
15 What is botnet?
A A software that runs automatically and autonomously.
B A software used for antispam
C A software used to manage MTA
D A software used to manage MDA

Answer: A software that runs automatically and autonomously.
16 Which of the following goals cannot be achieved with the help of Symmetric Cryptography?
A Nonrepudiation
B Confidentiality
C Integrity
D Availability.

Answer: Availability.
17 To which of the following components does the MUA(Mail User Agent) forward the mail while sending it to another host in the e-mail flow?
A Mail User Agent
B Firewall
C Router
D Mail Transfer Agent

Answer: Mail Transfer Agent
18 What is the maximum key length of AES?
A 56
B 156
C Variable
D 256

Answer: 256
19 Which of the following are disadvantages of the Symmetric Key Cryptography?
A Nonrepudiation
B Scalability
C Key distribution
D Security

Answer: Key distribution
20 What are the Measures to be Adopt for Best Virus Protection? Use of Antivirus.
A Use of Firewall.
B Keeping Software updated.
C Download only trusted programs.
D Be cautious about Phishing and Social Engineering.
E Be wise with Passwords. All Of the Above
F All Of the Above

Answer: All Of the Above

Random GK Questions

Assam Direct Recruitment Test Series

Teacher Eligibility Test

Assam Direct Recruitment Test Series