Cyber Security Objective Questions and Answers | Cyber Security MCQs and Answers

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
1 Which of the following are the ways through which virus spreads?
A Floppy Disk
B CD
C Email attachments
D Network connection
E All of the above

Answer: All of the above
2 Which of the following are categories of spam mails?
A Phishing and Fraud
B Spoofing mails
C Hoaxes
D Chain mails
E All of the above

Answer: All of the above
Advertisement
Article and Schedule Quiz Start Test!
DOWNLOAD CURRENT AFFAIRS PDF FROM APP
3 Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:
A Negative detection
B False positive
C False negative
D Untrue detection

Answer: False negative
4 Which of the following are preventive antivirus measures?
A Do not open attachments from suspicious sources.
B Delete chain and junk mails.
C Exercise caution while downloading from the internet
D Backup your files.
E All of the above

Answer: All of the above
5 Which of the following ports is used by IMAP?
A 139
B 143
C 142
D 25

Answer: 143
6 What are zombies?
A Antispam solutions.
B Remotely controlled hosts.
C Antivirus solutions
D Hackers

Answer: Remotely controlled hosts.
7 How many keys are required if two parties communicate using Asymmetric Cryptography?
A One
B Two
C Three
D Four

Answer: Two
8 How many keys are required if two parties communicate using Asymmetric Cryptography?
A One
B Two
C Three
D Sasser Worm
E Four

Answer: Two
9 Which of the following programs establishes modem connection with payper-visit resources?
A Trojans
B Automatic dialers
C Worms
D Antivirus

Answer: Automatic dialers
10 What is Phishing?
A Fraudulently acquiring sensitive information.
B An encryption technique
C An anti-spam technique
D A password building technique

Answer: Fraudulently acquiring sensitive information.
11 Which of the following are direct harms caused by spam?
A Loss of productivity
B Increased staff costs
C Increased infrastructure costs
D Increased downloading costs
E All of the above

Answer: All of the above
12 Which of the following is the Hashing Algorithm?
A AES
B 3-DES
C DES
D MD5

Answer: MD5
13 Which key is used to decrypt the message in PKI?
A Public Key.
B Private Key.
C Pre-shared Secret Key.
D Hybrid Key.

Answer: Private Key.
14 What is Joe Job?
A A virus
B An antivirus
C A spam attack
D An antispam

Answer: A spam attack
15 Which of the following are Email Security Protocols?
A S/MIME
B PEM
C STE
D PME

Answer: S/MIME
16 Which of the following symmetric algorithms have variable key length?
A AES
B Triple DES
C IDEA
D Rivest Cipher

Answer: Rivest Cipher
17 What is Mail Exchanger(MX) Record? Router route.
A Record in router.
B Record in DNS specifying the internet email route.
C Record in DNS specifying the internet email route.
D Record in DHCP specifying the email route

Answer: Record in DNS specifying the internet email route.
18 Which of the following measures should be taken to tackle spam mails?
A Blocking and accepting on the basis of MTA IP address
B Limiting the number of outgoing e-mails per account
C Authentication mechanisms
D Spam filtering.
E All of the above

Answer: All of the above
19 Which of the following are different categories of viruses?
A Parasitic
B Bootstrap sector
C Companion
D All of the above

Answer: All of the above
20 What is the function of the Reverse DNS Look up Technique in identifying spam mails?
A To check the sender's email server attempting for spoofing
B To check the receiver's email server attempting for spoofing
C To check the DNS server validity
D None of these

Answer: To check the DNS server validity
Assam Direct Recruitment Test Series

Teacher Eligibility Test

Assam Direct Recruitment Test Series