This section contains more frequently asked Computer Security Multiple Choice Questions Answers in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. Which of the following are the ways through which virus spreads?

  • Floppy Disk
  • CD
  • Email attachments
  • Network connection
  • All of the above

2. Which of the following are categories of spam mails?

  • Phishing and Fraud
  • Spoofing mails
  • Hoaxes
  • Chain mails
  • All of the above

3. Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:

  • Negative detection
  • False positive
  • False negative
  • Untrue detection

4. Which of the following are preventive antivirus measures?

  • Do not open attachments from suspicious sources.
  • Delete chain and junk mails.
  • Exercise caution while downloading from the internet
  • Backup your files.
  • All of the above

5. Which of the following ports is used by IMAP?

  • 139
  • 143
  • 142
  • 25

6. What are zombies?

  • Antispam solutions.
  • Remotely controlled hosts.
  • Antivirus solutions
  • Hackers

7. How many keys are required if two parties communicate using Asymmetric Cryptography?

  • One
  • Two
  • Three
  • Four

8. Which of the following programs establishes modem connection with pay-per-visit resources?

  • Trojans
  • Automatic dialers
  • Worms
  • Antivirus

9. Suppose you got a mail from the HSBC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?

  • Phishing and fraud.
  • Chain Mails.
  • Hoaxes
  • Brand spoofing.

10. What is Phishing?

  • Fraudulently acquiring sensitive information.
  • An encryption technique
  • An anti-spam technique
  • A password building technique
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook