Note: This Question is unanswered, help us to find answer for this one
32. Suppose you got a mail from the HSBC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?
Answer
Correct Answer:
Brand spoofing.
Note: This Question is unanswered, help us to find answer for this one
33. Which of the following programs establishes modem connection with pay-per-visit resources?
Answer
Correct Answer:
Automatic dialers
Note: This Question is unanswered, help us to find answer for this one
34. How many keys are required if two parties communicate using Asymmetric Cryptography?
Answer
Correct Answer:
Four
Note: This Question is unanswered, help us to find answer for this one
35. What are zombies?
Answer
Correct Answer:
Remotely controlled hosts.
Note: This Question is unanswered, help us to find answer for this one
36. Which of the following ports is used by IMAP?
Answer
Correct Answer:
143
Note: This Question is unanswered, help us to find answer for this one
37. Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:
Answer
Correct Answer:
False negative
Note: This Question is unanswered, help us to find answer for this one
38. Which of the following are categories of spam mails?
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
39. Which of the following are the ways through which virus spreads?
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
40. Which of the following are disadvantages of the Symmetric Key Cryptography?
Answer
Correct Answer:
Nonrepudiation Security
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
41. What is the maximum key length of AES?
Answer
Correct Answer:
256
Note: This Question is unanswered, help us to find answer for this one
42. To which of the following components does the MUA(Mail User Agent) forward the mail while sending it to another host in the e-mail flow?
Answer
Correct Answer:
Mail Transfer Agent
Note: This Question is unanswered, help us to find answer for this one
43. What is botnet?
Answer
Correct Answer:
A software that runs automatically and autonomously.
Note: This Question is unanswered, help us to find answer for this one
44. Suppose you got a mail from someone saying that you have won a $1 billion and asking you to give him/her $4000 to claim your prize. Under which category does this type of spam mail lie?
Answer
Correct Answer:
Phishing and Fraud
Note: This Question is unanswered, help us to find answer for this one
45. Which of the following is the Symmetric Algorithm used in cryptography?
Answer
Correct Answer:
IDEA
Note: This Question is unanswered, help us to find answer for this one
46. Which of the following types of virus lives in the boot sector?
Answer
Correct Answer:
Bootstrap sector
Note: This Question is unanswered, help us to find answer for this one
47. Which of the following techniques are used by spammers to find valid/existent email addresses?
Answer
Correct Answer:
Directory Harvest Attack
Note: This Question is unanswered, help us to find answer for this one
48. Which of the following are famous worm attacks?
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
49. Which of the following antispam measures are taken to reduce spam?
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
50. What is S/MIME?
Answer
Correct Answer:
Secure Multipurpose Internet Mail Extensions
Note: This Question is unanswered, help us to find answer for this one
51. How many keys are required if two parties communicate using Symmetric Cryptography?
Answer
Correct Answer:
One
Note: This Question is unanswered, help us to find answer for this one
52. Which of the following files are mostly infected?
Answer
Correct Answer:
.EXE .COM
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
53. Which of the following actions can be taken while filtering SMTP spam traffic?
Answer
Correct Answer:
Delete the spam mail Redirect it to the spam mail box Tag the spam mail
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
54.
Which of the following are direct harms caused by spam?
Answer
Correct Answer:
MD5
Note: This Question is unanswered, help us to find answer for this one
55. In order to help prevent spam, a tarpit performs which of the following functions?
Answer
Correct Answer:
delivers suspected spam messages more slowly
Note: This Question is unanswered, help us to find answer for this one
56. When using greylist filtering, a message will be considered legitimate if it does which of the following?
Answer
Correct Answer:
sends its message more than once
Note: This Question is unanswered, help us to find answer for this one
57. Which is not an example of a real life virus or worm discovered during the time period of 1980 to 2013?
Answer
Correct Answer:
iRiot
Note: This Question is unanswered, help us to find answer for this one
58. Which of the following sites use disposable email addressing?
Answer
Correct Answer:
Craigslist
Note: This Question is unanswered, help us to find answer for this one
59. Polymorphic viruses randomly generate which of the following items before infecting a new file?
Answer
Correct Answer:
mutation engine
Note: This Question is unanswered, help us to find answer for this one
60. Which of the following is true of a trojan virus?
Answer
Correct Answer:
a Trojan doesn't self-replicate
Note: This Question is unanswered, help us to find answer for this one
61. A virus can hide itself from an antivirus software by doing which of the following?
Answer
Correct Answer:
intercepting operating system read and write requests
Note: This Question is unanswered, help us to find answer for this one
62. Which of the following best describes a distributed antivirus tool that consist of a scanning client and a corresponding web service?
Answer
Correct Answer:
Cloud Antivirus
Note: This Question is unanswered, help us to find answer for this one
63. Most spyware is used to...
Answer
Correct Answer:
track a user's movement on the web or display pop-up ads
Note: This Question is unanswered, help us to find answer for this one
64. Which of the following differentiates a virus from a worm?
Answer
Correct Answer:
a virus requires user interaction to infect a machine
Note: This Question is unanswered, help us to find answer for this one
65. What is the difference between a worm and virus?
Answer
Correct Answer:
Unlike a virus, a worm does not need to attach itself to a program to spread.
Note: This Question is unanswered, help us to find answer for this one
66. On a WordPress site, which is the default service/tool to prevent spammers from posting comments?
Answer
Correct Answer:
Akismet
Note: This Question is unanswered, help us to find answer for this one
67. Which of the following spam filtering techniques statistically analyzes mail?
Answer
Correct Answer:
Bayesian Filtering
Note: This Question is unanswered, help us to find answer for this one
68. Firewalls help to prevent which of the following malware from propagating?
Answer
Correct Answer:
Worms
Note: This Question is unanswered, help us to find answer for this one
69. Is commercial SPAM legal in the United States?
Answer
Correct Answer:
Yes, but only if it follows the standards listed in the CAN-SPAM Act of 2003
Note: This Question is unanswered, help us to find answer for this one
70. Which of the following is true of macro viruses?
Answer
Correct Answer:
They depend on applications to propagate
Note: This Question is unanswered, help us to find answer for this one
71. In a compromised system, which of the following provides the safest way to analyze it?
Answer
Correct Answer:
Live CD/DVD
Note: This Question is unanswered, help us to find answer for this one
72. How can delivering mail as text instead of html help prevent spam?
Answer
Correct Answer:
text mail prevents web bugs from alerting spammer that the message was opened
Note: This Question is unanswered, help us to find answer for this one
73. What is email spoofing?
Answer
Correct Answer:
When someone forges or makes it appear that a email being sent is from a particular sender when it really is being sent by someone else.
Note: This Question is unanswered, help us to find answer for this one
74. Which of the following reduces spam by rejecting mail from a specific ip addresses?
Answer
Correct Answer:
DNS Blacklisting
Note: This Question is unanswered, help us to find answer for this one
75. Which of the following tools would NOT be useful in figuring out what spyware or viruses could be installed on a client's computer?
Answer
Correct Answer:
WireShark
Note: This Question is unanswered, help us to find answer for this one
76. Performing outbound spam filtering does which of the following for an organization?
Answer
Correct Answer:
helps prevent blacklisting
Note: This Question is unanswered, help us to find answer for this one
77. What is CryptoLocker?
Answer
Correct Answer:
A type of ransomware which encrypts user files and demands payment for the decryption key.
Note: This Question is unanswered, help us to find answer for this one
78. When a spammer forges the sender's address and enters an invalid receiver, which of the following settings will cause the receiving mail server to create backscatter?
Answer
Correct Answer:
Bounce messages
Note: This Question is unanswered, help us to find answer for this one
79. Which is not an example of an anti-spyware tool?
Answer
Correct Answer:
Kazaa
Note: This Question is unanswered, help us to find answer for this one
80. Why are disposable email addresses useful?
Answer
Correct Answer:
It is useful for someone who needs to give out their email or sign up to a website, but wants to protect their real email address from SPAM.
Note: This Question is unanswered, help us to find answer for this one
81. What is a botnet?
Answer
Correct Answer:
A collection of computers working together to perform a single task. These computers are often penetrated by software containing malware.
Note: This Question is unanswered, help us to find answer for this one
82. What is the main difference between spyware and other malware?
Answer
Correct Answer:
Spyware tends to steal or monitor data and/or personal information while malware encompasses all software that may been made with malicious intent in mind
Note: This Question is unanswered, help us to find answer for this one
83. Which of the following sites provide services for users to setup disposable emails?
Answer
Correct Answer:
jetable.org
Note: This Question is unanswered, help us to find answer for this one
84. What is an example of a captcha?
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
85. A client asks you to fix his computer because it has ransomware on it. He says he sees a message as soon as he loads windows, and cannot do anything else. What is the best way to fix this computer without losing any of his data?
Answer
Correct Answer:
Boot from a USB drive and run a program to remove the malware
Note: This Question is unanswered, help us to find answer for this one
86. What is an example of a "419" Scam
Answer
Correct Answer:
A con in which someone asks you for assistance in retrieving a vast sum of money. Often it involves you helping him or her pay off certain fees and in return they promise to share the money with you.
Note: This Question is unanswered, help us to find answer for this one
87. Which of these techniques would be effective in helping to prevent phishing attacks by scammers?
Answer
Correct Answer:
Scan for and fix XSS issues
Note: This Question is unanswered, help us to find answer for this one
88. Why shouldn't a user click unsubscribe links from spam messages?
Answer
Correct Answer:
the click may validate the email address
Note: This Question is unanswered, help us to find answer for this one
89. A virus can spread to another computer by
Answer
Correct Answer:
Sharing an infected file with another computer
Note: This Question is unanswered, help us to find answer for this one
90. How can you help stop spam?
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
91. In order to infect a system, clicking an email attachment must cause which of the following conditions to occur?
Answer
Correct Answer:
the attachment executes
Note: This Question is unanswered, help us to find answer for this one
92. What is a captcha?
Answer
Correct Answer:
It is a tool websites often use to prevent automated spammer bots from posting or registering on a website by forcing the user to do a task, often entering in letters or numbers based on a picture or audio, which verifies that they are human.
Note: This Question is unanswered, help us to find answer for this one
93. What are types of malware?
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
94. Which of the following is not a well known anti-virus program?
Answer
Correct Answer:
SMAG
Note: This Question is unanswered, help us to find answer for this one
95. Malware is short for
Answer
Correct Answer:
Malicious Software
Note: This Question is unanswered, help us to find answer for this one
96. What is a good method for a website owner to confirm a user is not using an account for a spamming purposes?
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
97. What could be a good indicator of a Spam email?
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
98. What is an example of a Phishing scam?
Answer
Correct Answer:
An email that appears to be legitimate, but is really being used to obtain personal or important information
Note: This Question is unanswered, help us to find answer for this one
99. Which of these is an example of a possible victim in a phishing attack?
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
100. What is a computer virus?
Answer
Correct Answer:
A type of malware that replicates itself and spreads to other files and/or computers.
Note: This Question is unanswered, help us to find answer for this one
101. What run command can you use to check what programs load on startup?
Answer
Correct Answer:
msconfig
Note: This Question is unanswered, help us to find answer for this one
102. Automated spamming tools subscribe to mail lists in order to complete which of the following tasks?
Answer
Correct Answer:
collect email addresses
Note: This Question is unanswered, help us to find answer for this one
103. If you cannot delete malware infected file, what is good method to try first?
Answer
Correct Answer:
Boot in Windows safe mode and attempt to delete the file
Note: This Question is unanswered, help us to find answer for this one
104. What is a keylogger?
Answer
Correct Answer:
Software that records keystrokes made on a keyboard
Note: This Question is unanswered, help us to find answer for this one
105. A virus is a program that attaches itself to (or replaces the contents of) which of the following file types?
Answer
Correct Answer:
Executables
Note: This Question is unanswered, help us to find answer for this one
106. What is rogue security software?
Answer
Correct Answer:
A fraudulent security program that appears to be helpful, but is actually not. It may deceive or mislead users into paying money to remove fake viruses or introduce malware after it is installed.
Note: This Question is unanswered, help us to find answer for this one
107. What is disposable email addressing?
Answer
Correct Answer:
A practice in which you set a unique email address for sender/recipient communication. Disposable email addresses typically forward to one or more real email mailboxes where the owner can receive and read messages without revealing their true email.
Note: This Question is unanswered, help us to find answer for this one