This section contains more frequently asked WEB Security MCQs in the various competitive exams.
1. Which of the following are different types of spam filtering methods?
- Blacklisting
- Rule based filtering
- Signature based filtering
- Bayesian filtering
- All of the above
2. Which of the following is used in a Directory Harvest Attack?
- Worms
- Brute Force
- Trojans
- Viruses
3. Which of the following resembles the Joe Job attack?
- A virus outbreak on the mail server
- Finding valid/existent email addresses
- Crashing of the mail server
- A spam attack that uses spoofed sender data and tarnishes the apparent sender's reputation
4. Which of the following is an asymmetric algorithm?
- MD5
- El Gamal
- IDEA
- SHA-1
5. Which of the following is used to entangle spammers?
- MDA
- Spam mails
- Trojans
- Honey pots
6. Which of the following protocols is used on the sender side when an electronic mail is sent from one host to another?
- SMTP
- POP3
- HTTP
- TLS
- SSL
7. Which of the following techniques are used to identify spam mails?
- Blacklists/Whitelists
- Integrity Check
- Heuristics
- Content Filtering
- Reverse DNS lookup
- All of the above
8. Which of the following actions can be taken while filtering POP3 spam traffic?
- Delete the spam mail
- Redirect it to the spam mail box
- Return it to the sender.
- Tag the spam mail
9. Which of the following is used to control zombies?
- Viruses
- Worms
- Trojan horses
- Spam mails
10. Which of the following are malicious code attacks?
- Brute force
- Trojan horses
- DDoS
- Viruses
- Malware