This section contains more frequently asked Data integrity and Security Multiple Choice Questions Answers in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. Which of the following are direct harms caused by spam?

  • Loss of productivity
  • Increased staff costs
  • Increased infrastructure costs
  • Increased downloading costs
  • All of the above

2. Which of the following is the Hashing Algorithm?

  • AES
  • 3-DES
  • DES
  • MD5

3. Which key is used to decrypt the message in PKI?

  • Public Key.
  • Private Key.
  • Pre-shared Secret Key.
  • Hybrid Key.

4. What is Joe Job?

  • A virus
  • An antivirus
  • A spam attack
  • An antispam

5. Which of the following are Email Security Protocols?

  • S/MIME
  • PEM
  • STE
  • PME

6. Which of the following symmetric algorithms have variable key length?

  • AES
  • Triple DES
  • IDEA
  • Rivest Cipher 4

7. What is Mail Exchanger(MX) Record?

  • Router route.
  • Record in router.
  • Record in DNS specifying the internet email route.
  • Record in DHCP specifying the email route

8. Which of the following measures should be taken to tackle spam mails?

  • Blocking and accepting on the basis of MTA IP address
  • Limiting the number of outgoing e-mails per account
  • Authentication mechanisms
  • Spam filtering.
  • All of the above

9. Which of the following are different categories of viruses?

  • Parasitic
  • Bootstrap sector
  • Companion
  • All of the above

10. What is the function of the Reverse DNS Look up Technique in identifying spam mails?

  • To check the sender's email server attempting for spoofing
  • To check the receiver's email server attempting for spoofing
  • To check the DNS server validity
  • None of these
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook