1. Where might a spammer get your personal information from?
2. What is disposable email addressing?
3. What is rogue security software?
4. A virus is a program that attaches itself to (or replaces the contents of) which of the following file types?
5. What is a keylogger?
6. In order for antivirus programs to be most effective, it is necessary to keep which of the following up to date?
7. If you cannot delete malware infected file, what is good method to try first?
8. Automated spamming tools subscribe to mail lists in order to complete which of the following tasks?
9. What run command can you use to check what programs load on startup?
10. What is a computer virus?
11. Which of these is an example of a possible victim in a phishing attack?
12. What is an example of a Phishing scam?
13. What could be a good indicator of a Spam email?
14. What is a good method for a website owner to confirm a user is not using an account for a spamming purposes?
15. Malware is short for
16. Which of the following is not a well known anti-virus program?
17. What are types of malware?
18. What is a captcha?
19. In order to infect a system, clicking an email attachment must cause which of the following conditions to occur?
20. How can you help stop spam?
21. A virus can spread to another computer by
22. Why shouldn't a user click unsubscribe links from spam messages?
23. Which of these techniques would be effective in helping to prevent phishing attacks by scammers?
24. What is an example of a "419" Scam
25. A client asks you to fix his computer because it has ransomware on it. He says he sees a message as soon as he loads windows, and cannot do anything else. What is the best way to fix this computer without losing any of his data?
26. What is an example of a captcha?
27. Which of the following sites provide services for users to setup disposable emails?
28. What is the main difference between spyware and other malware?
29. What is a botnet?
30. What is a backdoor?
31. Virus infection via email attachments can be minimized using which of the following?
32. Which of the following spam filtering issues stops valid messages from being delivered?
33. You have been told by several of your friends you have recently sent SPAM emails to them, what could be the cause of this and what should you do?
34. What is ransomware?
35. Why are disposable email addresses useful?
36. Which is most likely something that could be considered strange account activity and may require further scrutiny on an e-commerce site?
37. Which is not an example of an anti-spyware tool?
38. When a spammer forges the sender's address and enters an invalid receiver, which of the following settings will cause the receiving mail server to create backscatter?
39. Which of the following spam filtering techniques has the highest potential for generating false positives?
40. Which of the following techniques requires posting an email address where only spammers would find it?
41. What is CryptoLocker?
42. Antivirus programs hash files on a computer in order to detect which of the following activities?
43. In order to help prevent spam, a honeypot performs which of the following functions?
44. Which type of analysis is an antivirus program performing when it observes a file's activities in a sandbox or decompiles a file and analyzes its instructions?
45. Performing outbound spam filtering does which of the following for an organization?
46. Which of the following tools would NOT be useful in figuring out what spyware or viruses could be installed on a client's computer?
47. Which of the following reduces spam by rejecting mail from a specific ip addresses?
48. What is email spoofing?
49. How can delivering mail as text instead of html help prevent spam?
50. Antivirus signatures are constructed using with of the following?
51. Which of the following can prevent virus infections?
52. In a compromised system, which of the following provides the safest way to analyze it?
53. Which of the following is true of macro viruses?
54. Which of the following characteristics classify a mail message as spam?
55. Is commercial SPAM legal in the United States?
56. Firewalls help to prevent which of the following malware from propagating?
57. Which of the following spam filtering techniques statistically analyzes mail?
58. On a WordPress site, which is the default service/tool to prevent spammers from posting comments?
59. What is the difference between a worm and virus?
60. Which of the following differentiates a virus from a worm?
61. Most spyware is used to...
62. Which of the following best describes a distributed antivirus tool that consist of a scanning client and a corresponding web service?
63. A virus can hide itself from an antivirus software by doing which of the following?
64. Which of the following is true of a trojan virus?
65. Polymorphic viruses randomly generate which of the following items before infecting a new file?
66. Which of the following sites use disposable email addressing?
67. Which is not an example of a real life virus or worm discovered during the time period of 1980 to 2013?
68. When using greylist filtering, a message will be considered legitimate if it does which of the following?
69. In order to help prevent spam, a tarpit performs which of the following functions?
70. Which is direct harms caused by spam?
71. Which action can be taken while filtering SMTP spam traffic?
72. Which file is mostly infected?
73. How many keys are required if two parties communicate using Symmetric Cryptography?
74. What is S/MIME?
75. Which antispam measure is taken to reduce spam?
76. Which is famou worm attack?
77. Which technique is used by spammer to find valid/existent email address?
78. Which technique help in cases of address forgery?
79. Which type of virus lives in the boot sector?
80. Which is the Symmetric Algorithm used in cryptography?
81. Suppose you got a mail from someone saying that you have won a $1 billion and asking you to give him/her $4000 to claim your prize. Under which category does this type of spam mail lie?
82. What is botnet?
83. To which component does the MUA(Mail User Agent) forward the mail while sending it to another host in the e-mail flow?
84. What is the maximum key length of AES?
85. Which is disadvantages of the Symmetric Key Cryptography?
86. Which is the way through which virus spread?
87. Which is categories of spam mails?
88. Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:
89. Which port is used by IMAP?
90. What are zombies?
91. How many keys are required if two parties communicate using Asymmetric Cryptography?
92. Which program establish modem connection with pay-per-visit resources?
93. Suppose you got a mail from the HSBC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?
94. What is Phishing?
95. Which is the Hashing Algorithm?
96. Which key is used to decrypt the message in PKI?
97. Which is Email Security Protocols?
98. Which symmetric algorithms have variable key length?
99. What is Mail Exchanger(MX) Record?
100. Which measure should be taken to tackle spam mails?
101. Which is different categories of viruses?
102. What is the function of the Reverse DNS Look up Technique in identifying spam mails?
103. What is IMAP?
104. Which is threats to Email Security?
105. Which symmetric encryption algorithms is/are supported by S/MIME?
106. Which is the disadvantages of verification?
107. How many antivirus programs should be installed on a single system?
108. Which is indirect harms caused by spam?
109. Which is the benefits reaped from spam by those associated with antispam measures?
110. What does 'RBL' stands for in Email Security?
111. Dave is fetching mails from a server lying at a remote location. Which protocol is he using to fetch the mails?
112. Which programs is used by a user to send and receive emails?
113. Which is different types of spam filtering methods?
114. Which is used in a Directory Harvest Attack?
115. Which resemble the Joe Job attack?
116. Which is an asymmetric algorithm?
117. Which is used to entangle spammers?
118. Which protocol is used on the sender side when an electronic mail is sent from one host to another?
119. Which technique used to identify spam mails?
120. What is the function of MTA(Mail Transfer Agent)?
121. Which actions can be taken while filtering POP3 spam traffic?
122. Which is used to control zombies?
123. Which is malicious code attacks?
124. Av software on a computer must have its ____ files regularly updated by downloads from the internet
125. One of the first software security applications is ____ software.