This section contains more frequently asked Information Security MCQs in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. Why are disposable email addresses useful?

  • It is useful for someone who needs to give out their email or sign up to a website, but wants to protect their real email address from SPAM.
  • It is useful for spammers to create false email addresses that does not exist in order to spoof the from email in their spam messsages.
  • It is useful for spammers who want to send out a one time mass email, but never use that same email address again
  • It is useful for people who do not want their emails to be read

2. What is ransomware?

  • A nickname for types of spyware that require a password on boot
  • Software that steals files from your computer and is used by blackmailers
  • A software that hijacks your computer and asks you to pay in order for it to be removed
  • Viruses that infect files and won't let you open them unless you know a certain pass code

3. What is disposable email addressing?

  • A practice in which a spammer sends out mass emails from a single email account, but never logs into that account again.
  • Email addresses that are not rea, but they appear on the from section of an email. They are often used to help protect spammer's from being traced.
  • Someone who creates an email for the sole purpose of sending out spam
  • A practice in which you set a unique email address for sender/recipient communication. Disposable email addresses typically forward to one or more real email mailboxes where the owner can receive and read messages without revealing their true email.

4. When a spammer forges the sender's address and enters an invalid receiver, which of the following settings will cause the receiving mail server to create backscatter?

  • Reject messages
  • Drop messages
  • Bounce messages
  • None of these

5. In order to help prevent spam, a honeypot performs which of the following functions?

  • acts as a desirable mail server in order to lure spammers
  • delivers suspected spam messages more slowly
  • traps suspected spam messages
  • routes suspected spam to special enclaves in the system

6. What is an example of a captcha?

  • An interactive program which have instructions that read: "Move the triangle into the circle"
  • 1 + 1 = ?
  • What are the characters in this picture?
  • All of these

7. You have been told by several of your friends you have recently sent SPAM emails to them, what could be the cause of this and what should you do?

  • A spammer may have infiltrated your email provider's host and compromised your account. You should notify your email provider.
  • A spammer or bot may have gained access to your email account and sent out SPAM to all of your contacts. You should change your password immediately.
  • A spammer has gained access to your email. Unfortunately, the only thing you can do to prevent further SPAM is to close your account and create a new email address.
  • A spammer is spoofing your email address. You should tell your friends to block the email address.

8. Which is not an example of an anti-spyware tool?

  • Ad-Aware
  • Windows Defender
  • Spybot
  • Kazaa

9. Which of the following spam filtering issues stops valid messages from being delivered?

  • false positives
  • false negatives

10. Which is most likely something that could be considered strange account activity and may require further scrutiny on an e-commerce site?

  • A user logs in from another computer than the last login
  • A user changes their email
  • Orders from several user accounts are being sent to the same physical address
  • A user changes their more than once password
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook