1. Which of the following actions can be taken while filtering SMTP spam traffic?

Answers:

  1. Delete the spam mail
  2. Redirect it to the spam mail box
  3. Return it to the sender.
  4. Tag the spam mail

2. Which of the following files are mostly infected?

Answers:

  1. .DOT
  2. .EXE
  3. .COM
  4. .TXT

3. What is the function of MTA(Mail Transfer Agent)?

Answers:

  1. It helps in reading the emails
  2. It receives and delivers the messages
  3. It resolves the names
  4. It detects emails carrying virus

4. What is DHA?

Answers:

  1. Directory Harvest Attack
  2. DNS Harvest Attack
  3. Direct Harvest Attack
  4. Dictionary Harvest Attack

5. How many keys are required if two parties communicate using Symmetric Cryptography?

Answers:

  1. One
  2. Two
  3. Three
  4. Four

6. What is S/MIME?

Answers:

  1. Secure Multipurpose Intranet Mail Extensions
  2. Secure Multipurpose Internet Mail Extensions
  3. Secure Multipurpose Internet Message Extensions
  4. Secure Multipurpose Intranet Message Extensions

7. Which of the following antispam measures are taken to reduce spam?

Answers:

  1. Legislative measures
  2. Organizational measures
  3. Behavioral measures
  4. Technological measures.
  5. All of the above

8. Which of the following are famous worm attacks?

Answers:

  1. MyDoom Worm
  2. Bagle Worm
  3. Netsky Worm
  4. Sasser Worm
  5. All of the above

9. Which of the following techniques are used by spammers to find valid/existent email addresses?

Answers:

  1. SMTP spoofing
  2. SMTP poisioning
  3. DNS poisioning
  4. Directory Harvest Attack

10. Daniel has deployed an antispam solution in his network. Positive detection of non-spam SMTP is called:

Answers:

  1. Negative detection
  2. False positive detection
  3. False negative detection
  4. Untrue detection

11. Which of the following techniques helps in cases of address forgery?

Answers:

  1. SMTP extensions
  2. Cryptographic authentication
  3. Path authentication
  4. Hybrid authentication

12. Which of the following types of virus lives in the boot sector?

Answers:

  1. Sector virus
  2. Parasitic virus
  3. Bootstrap sector
  4. Bootable virus

13. Which of the following is the Symmetric Algorithm used in cryptography?

Answers:

  1. MD4
  2. El Gamal
  3. IDEA
  4. RSA

14. Suppose you got a mail from someone saying that you have won a $1 billion and asking you to give him/her $4000 to claim your prize. Under which category does this type of spam mail lie?

Answers:

  1. Phishing and Fraud
  2. Spoofing mails
  3. Hoaxes
  4. Chain mails

15. What is botnet?

Answers:

  1. A software that runs automatically and autonomously.
  2. A software used for antispam
  3. A software used to manage MTA
  4. A software used to manage MDA

16. Which of the following goals cannot be achieved with the help of Symmetric Cryptography?

Answers:

  1. Nonrepudiation
  2. Confidentiality
  3. Integrity
  4. Availability.

17. To which of the following components does the MUA(Mail User Agent) forward the mail while sending it to another host in the e-mail flow?

Answers:

  1. Mail User Agent
  2. Firewall
  3. Router
  4. Mail Transfer Agent

18. What is the maximum key length of AES?

Answers:

  1. 56
  2. 156
  3. Variable
  4. 256

19. Which of the following are disadvantages of the Symmetric Key Cryptography?

Answers:

  1. Nonrepudiation.
  2. Scalability.
  3. Key distribution.
  4. Security.

20. Which of the following are antivirus measures?

Answers:

  1. Backup all the softwares and data.
  2. Disable the use of external media like floppies etc
  3. Install antivirus.
  4. If the antivirus does not recognize suspicious items, consult an antivirus professional.
  5. Update antivirus regularly
  6. All of the above

21. Which of the following are the ways through which virus spreads?

Answers:

  1. Floppy Disk
  2. CD
  3. Email attachments
  4. Network connection
  5. All of the above

22. Which of the following are categories of spam mails?

Answers:

  1. Phishing and Fraud
  2. Spoofing mails
  3. Hoaxes
  4. Chain mails
  5. All of the above

23. Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:

Answers:

  1. Negative detection
  2. False positive
  3. False negative
  4. Untrue detection

24. Ques:Which of the following are preventive antivirus measures?

Answers:

  1. Do not open attachments from suspicious sources.
  2. Delete chain and junk mails.
  3. Exercise caution while downloading from the internet
  4. Backup your files.
  5. All of the above

25. Which of the following ports is used by IMAP?

Answers:

  1. 139
  2. 137
  3. 143
  4. 142
  5. 25

26. What are zombies?

Answers:

  1. Antispam solutions.
  2. Remotely controlled hosts.
  3. Antivirus solutions
  4. Hackers

27. How many keys are required if two parties communicate using Asymmetric Cryptography?

Answers:

  1. One
  2. Two
  3. Three
  4. Four

28. Which of the following programs establishes modem connection with pay-per-visit resources?

Answers:

  1. Trojans
  2. Automatic dialers
  3. Worms
  4. Antivirus

29. Suppose you got a mail from the HSBC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?

Answers:

  1. Phishing and fraud.
  2. Chain Mails.
  3. Hoaxes.
  4. Brand spoofing.

30. What is Phishing?

Answers:

  1. Fraudulently acquiring sensitive information.
  2. An encryption technique
  3. An anti-spam technique
  4. A password building technique

31. Which of the following are direct harms caused by spam?

Answers:

  1. Loss of productivity
  2. Increased staff costs
  3. Increased infrastructure costs
  4. Increased downloading costs
  5. All of the above

32. Which of the following is the Hashing Algorithm?

Answers:

  1. AES
  2. 3-DES
  3. DES
  4. MD5

33. Which key is used to decrypt the message in PKI?

Answers:

  1. Public Key.
  2. Private Key.
  3. Pre-shared Secret Key.
  4. Hybrid Key.

34. What is Joe Job?

Answers:

  1. A virus
  2. An antivirus
  3. A spam attack
  4. An antispam

35. Which of the following are Email Security Protocols?

Answers:

  1. S/MIME
  2. PEM
  3. STE
  4. PME

36. Which of the following symmetric algorithms have variable key length?

Answers:

  1. AES
  2. Triple DES
  3. IDEA
  4. Rivest Cipher 4

37. What is Mail Exchanger(MX) Record?

Answers:

  1. Router route.
  2. Record in router.
  3. Record in DNS specifying the internet email route.
  4. Record in DHCP specifying the email route.

38. Which of the following measures should be taken to tackle spam mails?

Answers:

  1. Blocking and accepting on the basis of MTA IP address.
  2. Limiting the number of outgoing e-mails per account
  3. Authentication mechanisms
  4. Spam filtering.
  5. All of the above

39. Which of the following are different categories of viruses?

Answers:

  1. Parasitic
  2. Bootstrap sector
  3. Companion
  4. Link
  5. All of the above

40. What is the function of the Reverse DNS Look up Technique in identifying spam mails?

Answers:

  1. To check the sender’s email server attempting for spoofing
  2. To check the receiver’s email server attempting for spoofing
  3. To check the DNS server validity

41. What is IMAP?

Answers:

  1. Internet Messaging Application
  2. Interanet Messaging Application
  3. Interanet Message Access Protocol
  4. Internet Message Access Protocol

42. Which of the following are threats to Email Security?

Answers:

  1. Viruses
  2. Trojans
  3. Spams
  4. Phishing
  5. All of the above

43. Which of the following symmetric encryption algorithms is/are supported by S/MIME?

Answers:

  1. RSA
  2. DES
  3. 3DES
  4. SHA-1

44. Which of the following are the disadvantages of verification?

Answers:

  1. More complications
  2. Increased internet traffic
  3. Problems in sending valid bulk mails
  4. Insecurity against social engineering.
  5. All of the above

45. How many antivirus programs should be installed on a single system?

Answers:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

46. Which of the following are indirect harms caused by spam?

Answers:

  1. Malicious payload
  2. Fraud
  3. Loss of reputation
  4. Increased communication costs
  5. All of the above

47. Which of the following are the benefits reaped from spam by those associated with antispam measures?

Answers:

  1. Antispam software sales
  2. Antivirus software sales
  3. Increased revenue from advertising
  4. Bandwidth sales
  5. All of the above

48. What does “RBL” stands for in Email Security?

Answers:

  1. Realtime Blacking List
  2. Realtime Blocking List
  3. Realtime Blockhole List
  4. Realtime Blackhole List

49. Dave is fetching mails from a server lying at a remote location. Which protocol is he using to fetch the mails?

Answers:

  1. SMTP
  2. HTTP
  3. SSL
  4. S/MIME
  5. POP3

50. Which of the following programs is used by a user to send and receive emails?

Answers:

  1. Mail Transfer Agent
  2. Mail Delivery Agent
  3. Mail User Agent
  4. Mail Reading Agent

51. Which of the following are different types of spam filtering methods?

Answers:

  1. Blacklisting
  2. Rule based filtering
  3. Signature based filtering
  4. Bayesian filtering
  5. All of the above

52. Which of the following is used in a Directory Harvest Attack?

Answers:

  1. Worms
  2. Brute Force
  3. Trojans
  4. Viruses

53. Which of the following resembles the Joe Job attack?

Answers:

  1. A virus outbreak on the mail server
  2. Finding valid/existent email addresses
  3. Crashing of the mail server
  4. A spam attack that uses spoofed sender data and tarnishes the apparent sender’s reputation

54. Which of the following is an asymmetric algorithm?

Answers:

  1. MD5
  2. El Gamal
  3. IDEA
  4. SHA-1

55. Which of the following is used to entangle spammers?

Answers:

  1. MDA
  2. Spam mails
  3. Trojans
  4. Honey pots

56. Which of the following protocols is used on the sender side when an electronic mail is sent from one host to another?

Answers:

  1. SMTP
  2. POP3
  3. HTTP
  4. SSL
  5. TLS

57. Which of the following techniques are used to identify spam mails?

Answers:

  1. Blacklists/Whitelists
  2. Integrity Check
  3. Heuristics
  4. Content Filtering
  5. Reverse DNS lookup
  6. All of the above

58. Which of the following actions can be taken while filtering POP3 spam traffic?

Answers:

  1. Delete the spam mail
  2. Redirect it to the spam mail box
  3. Return it to the sender.
  4. Tag the spam mail

59. Which of the following is used to control zombies?

Answers:

  1. Viruses
  2. Worms
  3. Trojan horses
  4. Spam mails

1,240 total views, 3 views today