This section contains more frequently asked WEB Security MCQs in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. Which of the following are different types of spam filtering methods?

  • Blacklisting
  • Rule based filtering
  • Signature based filtering
  • Bayesian filtering
  • All of the above

2. Which of the following is used in a Directory Harvest Attack?

  • Worms
  • Brute Force
  • Trojans
  • Viruses

3. Which of the following resembles the Joe Job attack?

  • A virus outbreak on the mail server
  • Finding valid/existent email addresses
  • Crashing of the mail server
  • A spam attack that uses spoofed sender data and tarnishes the apparent sender's reputation

4. Which of the following is an asymmetric algorithm?

  • MD5
  • El Gamal
  • IDEA
  • SHA-1

5. Which of the following is used to entangle spammers?

  • MDA
  • Spam mails
  • Trojans
  • Honey pots

6. Which of the following protocols is used on the sender side when an electronic mail is sent from one host to another?

  • SMTP
  • POP3
  • HTTP
  • TLS
  • SSL

7. Which of the following techniques are used to identify spam mails?

  • Blacklists/Whitelists
  • Integrity Check
  • Heuristics
  • Content Filtering
  • Reverse DNS lookup
  • All of the above

8. Which of the following actions can be taken while filtering POP3 spam traffic?

  • Delete the spam mail
  • Redirect it to the spam mail box
  • Return it to the sender.
  • Tag the spam mail

9. Which of the following is used to control zombies?

  • Viruses
  • Worms
  • Trojan horses
  • Spam mails

10. Which of the following are malicious code attacks?

  • Brute force
  • Trojan horses
  • DDoS
  • Viruses
  • Malware
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook