Anti Spam And Antivirus Mcqs
Q.1: Which of the following measures should be taken to tackle spam mails?F
A. Blocking and accepting on the basis of MTA IP address.6
B. Limiting the number of outgoing e-mails per account3
C. All of the above
D. Spam filtering.
Q.2: What is Mail Exchanger(MX) Record?"
A. Router route.
B. Record in router.
C. Record in DNS specifying the internet email route. 3
D. Record in DHCP specifying the email route.*
Q.3: Which of the following symmetric algorithms have variable key length?E
A. AES
B. Triple DES
C. IDEA
D. Rivest Cipher 4
Q.4: Which of the following are Email Security Protocols?4
A. S/MIME
B. PEM
C. STE
D. PME
Q.5: Which key is used to decrypt the message in PKI?0
A. Public Key.
B. Private Key.
C. Pre-shared Secret Key.
D. Hybrid Key.
Q.6: Which of the following is the Hashing Algorithm?0
A. AES
B. 3-DES
C. DES
D. MD5
Q.7: What is Phishing?
A. Fraudulently acquiring sensitive information.-
B. An encryption technique
C. An anti-spam technique
D. A password building technique
Q.8: Suppose you got a mail from the HSBC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?
A. Phishing and fraud.
B. Chain Mails.
C. Hoaxes.
D. Brand spoofing.
Q.9: Which of the following programs establishes modem connection with pay-per-visit resources?Z
A. Trojans
B. Automatic dialers
C. Worms
D. Antivirus
Q.10: How many keys are required if two parties communicate using Asymmetric Cryptography?T
A. One
B. Two
C. Three
D. Four

Related Mcqs

All Subject Mcqs