MCQs > IT & Programming > Antispam And Antivirus MCQs > Basic Antispam and Antivirus MCQs

Basic Antispam and Antivirus MCQ

1. One of the first software security applications is ____ software.

Answer

Correct Answer: Antivirus

Note: This Question is unanswered, help us to find answer for this one

2. Av software on a computer must have its ____ files regularly updated by downloads from the internet

Answer

Correct Answer: Signature

Note: This Question is unanswered, help us to find answer for this one

3. Which of the following are malicious code attacks?

Answer

Correct Answer: Trojan horses
Viruses
Malware

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

4. Which of the following is used to control zombies?

Answer

Correct Answer: Trojan horses

Note: This Question is unanswered, help us to find answer for this one

5. Which of the following actions can be taken while filtering POP3 spam traffic?

Answer

Correct Answer: Tag the spam mail

Note: This Question is unanswered, help us to find answer for this one

6. What is the function of MTA(Mail Transfer Agent)?

Answer

Correct Answer: It receives and delivers the messages

Note: This Question is unanswered, help us to find answer for this one

7. Which of the following techniques are used to identify spam mails?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

8. Which of the following protocols is used on the sender side when an electronic mail is sent from one host to another?

Answer

Correct Answer: SMTP

Note: This Question is unanswered, help us to find answer for this one

9. Which of the following is used to entangle spammers?

Answer

Correct Answer: Honey pots

Note: This Question is unanswered, help us to find answer for this one

10. Which of the following is an asymmetric algorithm?

Answer

Correct Answer: El Gamal

Note: This Question is unanswered, help us to find answer for this one

11. Which of the following resembles the Joe Job attack?

Answer

Correct Answer: A spam attack that uses spoofed sender data and tarnishes the apparent sender's reputation

Note: This Question is unanswered, help us to find answer for this one

12. Which of the following is used in a Directory Harvest Attack?

Answer

Correct Answer: Brute Force

Note: This Question is unanswered, help us to find answer for this one

13. Which of the following are different types of spam filtering methods?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

14. Which of the following programs is used by a user to send and receive emails?

Answer

Correct Answer: Mail User Agent

Note: This Question is unanswered, help us to find answer for this one

15. Dave is fetching mails from a server lying at a remote location. Which protocol is he using to fetch the mails?

Answer

Correct Answer: POP3

Note: This Question is unanswered, help us to find answer for this one

16. What does "RBL" stands for in Email Security?

Answer

Correct Answer: Realtime Blackhole List

Note: This Question is unanswered, help us to find answer for this one

17. Which of the following are the benefits reaped from spam by those associated with antispam measures?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

18. Which of the following are indirect harms caused by spam?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

19. How many antivirus programs should be installed on a single system?

Answer

Correct Answer: 1

Note: This Question is unanswered, help us to find answer for this one

20. Which of the following are the disadvantages of verification?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

21. Which of the following symmetric encryption algorithms is/are supported by S/MIME?

Answer

Correct Answer: DES
3DES

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

22. What is IMAP?

Answer

Correct Answer: Internet Message Access Protocol

Note: This Question is unanswered, help us to find answer for this one

23. What is the function of the Reverse DNS Look up Technique in identifying spam mails?

Answer

Correct Answer: To check the sender's email server attempting for spoofing

Note: This Question is unanswered, help us to find answer for this one

24. Which of the following are different categories of viruses?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

25. Which of the following measures should be taken to tackle spam mails?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

26. What is Mail Exchanger(MX) Record?

Answer

Correct Answer: Record in DNS specifying the internet email route.

Note: This Question is unanswered, help us to find answer for this one

27. Which of the following symmetric algorithms have variable key length?

Answer

Correct Answer: Rivest Cipher 4

Note: This Question is unanswered, help us to find answer for this one

28. Which of the following are Email Security Protocols?

Answer

Correct Answer: S/MIME
PEM

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

29. Which key is used to decrypt the message in PKI?

Answer

Correct Answer: Private Key.

Note: This Question is unanswered, help us to find answer for this one

30. Which of the following is the Hashing Algorithm?

Answer

Correct Answer: MD5

Note: This Question is unanswered, help us to find answer for this one

31. What is Phishing?

Answer

Correct Answer: Fraudulently acquiring sensitive information.

Note: This Question is unanswered, help us to find answer for this one

32. Suppose you got a mail from the HSBC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?

Answer

Correct Answer: Brand spoofing.

Note: This Question is unanswered, help us to find answer for this one

33. Which of the following programs establishes modem connection with pay-per-visit resources?

Answer

Correct Answer: Automatic dialers

Note: This Question is unanswered, help us to find answer for this one

34. How many keys are required if two parties communicate using Asymmetric Cryptography?

Answer

Correct Answer: Four

Note: This Question is unanswered, help us to find answer for this one

35. What are zombies?

Answer

Correct Answer: Remotely controlled hosts.

Note: This Question is unanswered, help us to find answer for this one

36. Which of the following ports is used by IMAP?

Answer

Correct Answer: 143

Note: This Question is unanswered, help us to find answer for this one

37. Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:

Answer

Correct Answer: False negative

Note: This Question is unanswered, help us to find answer for this one

38. Which of the following are categories of spam mails?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

39. Which of the following are the ways through which virus spreads?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

40. Which of the following are disadvantages of the Symmetric Key Cryptography?

Answer

Correct Answer: Nonrepudiation
Security

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

41. What is the maximum key length of AES?

Answer

Correct Answer: 256

Note: This Question is unanswered, help us to find answer for this one

42. To which of the following components does the MUA(Mail User Agent) forward the mail while sending it to another host in the e-mail flow?

Answer

Correct Answer: Mail Transfer Agent

Note: This Question is unanswered, help us to find answer for this one

43. What is botnet?

Answer

Correct Answer: A software that runs automatically and autonomously.

Note: This Question is unanswered, help us to find answer for this one

44. Suppose you got a mail from someone saying that you have won a $1 billion and asking you to give him/her $4000 to claim your prize. Under which category does this type of spam mail lie?

Answer

Correct Answer: Phishing and Fraud

Note: This Question is unanswered, help us to find answer for this one

45. Which of the following is the Symmetric Algorithm used in cryptography?

Answer

Correct Answer: IDEA

Note: This Question is unanswered, help us to find answer for this one

46. Which of the following types of virus lives in the boot sector?

Answer

Correct Answer: Bootstrap sector

Note: This Question is unanswered, help us to find answer for this one

47. Which of the following techniques are used by spammers to find valid/existent email addresses?

Answer

Correct Answer: Directory Harvest Attack

Note: This Question is unanswered, help us to find answer for this one

48. Which of the following are famous worm attacks?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

49. Which of the following antispam measures are taken to reduce spam?

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

50. What is S/MIME?

Answer

Correct Answer: Secure Multipurpose Internet Mail Extensions

Note: This Question is unanswered, help us to find answer for this one

51. How many keys are required if two parties communicate using Symmetric Cryptography?

Answer

Correct Answer: One

Note: This Question is unanswered, help us to find answer for this one

52. Which of the following files are mostly infected?

Answer

Correct Answer: .EXE
.COM

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

53. Which of the following actions can be taken while filtering SMTP spam traffic?

Answer

Correct Answer: Delete the spam mail
Redirect it to the spam mail box
Tag the spam mail

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

54.

Which of the following are direct harms caused by spam?

Answer

Correct Answer: MD5

Note: This Question is unanswered, help us to find answer for this one

55. In order to help prevent spam, a tarpit performs which of the following functions?

Answer

Correct Answer: delivers suspected spam messages more slowly

Note: This Question is unanswered, help us to find answer for this one

56. When using greylist filtering, a message will be considered legitimate if it does which of the following?

Answer

Correct Answer: sends its message more than once

Note: This Question is unanswered, help us to find answer for this one

57. Which is not an example of a real life virus or worm discovered during the time period of 1980 to 2013?

Answer

Correct Answer: iRiot

Note: This Question is unanswered, help us to find answer for this one

58. Which of the following sites use disposable email addressing?

Answer

Correct Answer: Craigslist

Note: This Question is unanswered, help us to find answer for this one

59. Polymorphic viruses randomly generate which of the following items before infecting a new file?

Answer

Correct Answer: mutation engine

Note: This Question is unanswered, help us to find answer for this one

60. Which of the following is true of a trojan virus?

Answer

Correct Answer: a Trojan doesn't self-replicate

Note: This Question is unanswered, help us to find answer for this one

61. A virus can hide itself from an antivirus software by doing which of the following?

Answer

Correct Answer: intercepting operating system read and write requests

Note: This Question is unanswered, help us to find answer for this one

62. Which of the following best describes a distributed antivirus tool that consist of a scanning client and a corresponding web service?

Answer

Correct Answer: Cloud Antivirus

Note: This Question is unanswered, help us to find answer for this one

63. Most spyware is used to...

Answer

Correct Answer: track a user's movement on the web or display pop-up ads

Note: This Question is unanswered, help us to find answer for this one

64. Which of the following differentiates a virus from a worm?

Answer

Correct Answer: a virus requires user interaction to infect a machine

Note: This Question is unanswered, help us to find answer for this one

65. What is the difference between a worm and virus?

Answer

Correct Answer: Unlike a virus, a worm does not need to attach itself to a program to spread.

Note: This Question is unanswered, help us to find answer for this one

66. On a WordPress site, which is the default service/tool to prevent spammers from posting comments?

Answer

Correct Answer: Akismet

Note: This Question is unanswered, help us to find answer for this one

67. Which of the following spam filtering techniques statistically analyzes mail?

Answer

Correct Answer: Bayesian Filtering

Note: This Question is unanswered, help us to find answer for this one

68. Firewalls help to prevent which of the following malware from propagating?

Answer

Correct Answer: Worms

Note: This Question is unanswered, help us to find answer for this one

69. Is commercial SPAM legal in the United States?

Answer

Correct Answer: Yes, but only if it follows the standards listed in the CAN-SPAM Act of 2003

Note: This Question is unanswered, help us to find answer for this one

70. Which of the following is true of macro viruses?

Answer

Correct Answer: They depend on applications to propagate

Note: This Question is unanswered, help us to find answer for this one

71. In a compromised system, which of the following provides the safest way to analyze it?

Answer

Correct Answer: Live CD/DVD

Note: This Question is unanswered, help us to find answer for this one

72. How can delivering mail as text instead of html help prevent spam?

Answer

Correct Answer: text mail prevents web bugs from alerting spammer that the message was opened

Note: This Question is unanswered, help us to find answer for this one

73. What is email spoofing?

Answer

Correct Answer: When someone forges or makes it appear that a email being sent is from a particular sender when it really is being sent by someone else.

Note: This Question is unanswered, help us to find answer for this one

74. Which of the following reduces spam by rejecting mail from a specific ip addresses?

Answer

Correct Answer: DNS Blacklisting

Note: This Question is unanswered, help us to find answer for this one

75. Which of the following tools would NOT be useful in figuring out what spyware or viruses could be installed on a client's computer?

Answer

Correct Answer: WireShark

Note: This Question is unanswered, help us to find answer for this one

76. Performing outbound spam filtering does which of the following for an organization?

Answer

Correct Answer: helps prevent blacklisting

Note: This Question is unanswered, help us to find answer for this one

77. What is CryptoLocker?

Answer

Correct Answer: A type of ransomware which encrypts user files and demands payment for the decryption key.

Note: This Question is unanswered, help us to find answer for this one

78. When a spammer forges the sender's address and enters an invalid receiver, which of the following settings will cause the receiving mail server to create backscatter?

Answer

Correct Answer: Bounce messages

Note: This Question is unanswered, help us to find answer for this one

79. Which is not an example of an anti-spyware tool?

Answer

Correct Answer: Kazaa

Note: This Question is unanswered, help us to find answer for this one

80. Why are disposable email addresses useful?

Answer

Correct Answer: It is useful for someone who needs to give out their email or sign up to a website, but wants to protect their real email address from SPAM.

Note: This Question is unanswered, help us to find answer for this one

81. What is a botnet?

Answer

Correct Answer: A collection of computers working together to perform a single task. These computers are often penetrated by software containing malware.

Note: This Question is unanswered, help us to find answer for this one

82. What is the main difference between spyware and other malware?

Answer

Correct Answer: Spyware tends to steal or monitor data and/or personal information while malware encompasses all software that may been made with malicious intent in mind

Note: This Question is unanswered, help us to find answer for this one

83. Which of the following sites provide services for users to setup disposable emails?

Answer

Correct Answer: jetable.org

Note: This Question is unanswered, help us to find answer for this one

84. What is an example of a captcha?

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

85. A client asks you to fix his computer because it has ransomware on it. He says he sees a message as soon as he loads windows, and cannot do anything else. What is the best way to fix this computer without losing any of his data?

Answer

Correct Answer: Boot from a USB drive and run a program to remove the malware

Note: This Question is unanswered, help us to find answer for this one

86. What is an example of a "419" Scam

Answer

Correct Answer: A con in which someone asks you for assistance in retrieving a vast sum of money. Often it involves you helping him or her pay off certain fees and in return they promise to share the money with you.

Note: This Question is unanswered, help us to find answer for this one

87. Which of these techniques would be effective in helping to prevent phishing attacks by scammers?

Answer

Correct Answer: Scan for and fix XSS issues

Note: This Question is unanswered, help us to find answer for this one

88. Why shouldn't a user click unsubscribe links from spam messages?

Answer

Correct Answer: the click may validate the email address

Note: This Question is unanswered, help us to find answer for this one

89. A virus can spread to another computer by

Answer

Correct Answer: Sharing an infected file with another computer

Note: This Question is unanswered, help us to find answer for this one

90. How can you help stop spam?

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

91. In order to infect a system, clicking an email attachment must cause which of the following conditions to occur?

Answer

Correct Answer: the attachment executes

Note: This Question is unanswered, help us to find answer for this one

92. What is a captcha?

Answer

Correct Answer: It is a tool websites often use to prevent automated spammer bots from posting or registering on a website by forcing the user to do a task, often entering in letters or numbers based on a picture or audio, which verifies that they are human.

Note: This Question is unanswered, help us to find answer for this one

93. What are types of malware?

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

94. Which of the following is not a well known anti-virus program?

Answer

Correct Answer: SMAG

Note: This Question is unanswered, help us to find answer for this one

95. Malware is short for

Answer

Correct Answer: Malicious Software

Note: This Question is unanswered, help us to find answer for this one

96. What is a good method for a website owner to confirm a user is not using an account for a spamming purposes?

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

97. What could be a good indicator of a Spam email?

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

98. What is an example of a Phishing scam?

Answer

Correct Answer: An email that appears to be legitimate, but is really being used to obtain personal or important information

Note: This Question is unanswered, help us to find answer for this one

99. Which of these is an example of a possible victim in a phishing attack?

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

100. What is a computer virus?

Answer

Correct Answer: A type of malware that replicates itself and spreads to other files and/or computers.

Note: This Question is unanswered, help us to find answer for this one

101. What run command can you use to check what programs load on startup?

Answer

Correct Answer: msconfig

Note: This Question is unanswered, help us to find answer for this one

102. Automated spamming tools subscribe to mail lists in order to complete which of the following tasks?

Answer

Correct Answer: collect email addresses

Note: This Question is unanswered, help us to find answer for this one

103. If you cannot delete malware infected file, what is good method to try first?

Answer

Correct Answer: Boot in Windows safe mode and attempt to delete the file

Note: This Question is unanswered, help us to find answer for this one

104. What is a keylogger?

Answer

Correct Answer: Software that records keystrokes made on a keyboard

Note: This Question is unanswered, help us to find answer for this one

105. A virus is a program that attaches itself to (or replaces the contents of) which of the following file types?

Answer

Correct Answer: Executables

Note: This Question is unanswered, help us to find answer for this one

106. What is rogue security software?

Answer

Correct Answer: A fraudulent security program that appears to be helpful, but is actually not. It may deceive or mislead users into paying money to remove fake viruses or introduce malware after it is installed.

Note: This Question is unanswered, help us to find answer for this one

107. What is disposable email addressing?

Answer

Correct Answer: A practice in which you set a unique email address for sender/recipient communication. Disposable email addresses typically forward to one or more real email mailboxes where the owner can receive and read messages without revealing their true email.

Note: This Question is unanswered, help us to find answer for this one