This section contains more frequently asked Computer Security Multiple Choice Questions Answers in the various competitive exams.
1. Which of the following are the ways through which virus spreads?
- Floppy Disk
- CD
- Email attachments
- Network connection
- All of the above
2. Which of the following are categories of spam mails?
- Phishing and Fraud
- Spoofing mails
- Hoaxes
- Chain mails
- All of the above
3. Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:
- Negative detection
- False positive
- False negative
- Untrue detection
4. Which of the following are preventive antivirus measures?
- Do not open attachments from suspicious sources.
- Delete chain and junk mails.
- Exercise caution while downloading from the internet
- Backup your files.
- All of the above
5. Which of the following ports is used by IMAP?
- 139
- 143
- 142
- 25
6. What are zombies?
- Antispam solutions.
- Remotely controlled hosts.
- Antivirus solutions
- Hackers
7. How many keys are required if two parties communicate using Asymmetric Cryptography?
- One
- Two
- Three
- Four
8. Which of the following programs establishes modem connection with pay-per-visit resources?
- Trojans
- Automatic dialers
- Worms
- Antivirus
9. Suppose you got a mail from the HSBC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?
- Phishing and fraud.
- Chain Mails.
- Hoaxes
- Brand spoofing.
10. What is Phishing?
- Fraudulently acquiring sensitive information.
- An encryption technique
- An anti-spam technique
- A password building technique