This section contains more frequently asked System Security and Computer Crime MCQs in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. Which of the following techniques requires posting an email address where only spammers would find it?

  • Tarpits
  • Spam Traps
  • Blacklists
  • None of these

2. Antivirus programs hash files on a computer in order to detect which of the following activities?

  • File size changes
  • File permissions changes
  • File content changes
  • All of these

3. Performing outbound spam filtering does which of the following for an organization?

  • helps prevent whitelisting
  • helps prevent blacklisting
  • helps prevent spam trapping
  • All of these

4. What is CryptoLocker?

  • A module of the Windows BitLocker encryption system.
  • A type of encrypted Linux file system.
  • A type of ransomware which encrypts user files and demands payment for the decryption key.
  • A malware class which is known for encrypting itself to avoid detection.

5. Which type of analysis is an antivirus program performing when it observes a file's activities in a sandbox or decompiles a file and analyzes its instructions?

  • Performance Analysis
  • Heuristic Analysis
  • Signature Analysis
  • All of these

6. Which of the following tools would NOT be useful in figuring out what spyware or viruses could be installed on a client's computer?

  • WireShark
  • Malware Bytes
  • HighjackThis
  • HitmanPro

7. How can delivering mail as text instead of html help prevent spam?

  • text mail prevents web bugs from alerting spammer that the message was opened
  • mail servers won't accept html messages if they are in text mode
  • text is easier to analyze for spammer information
  • All of these

8. What is email spoofing?

  • Copying or forwarding emails and then editing their To and From to make it appear that the email was originally sent to or from someone else
  • When someone forges or makes it appear that a email being sent is from a particular sender when it really is being sent by someone else.
  • When someone sends an email that appears to look like a legitimate, but it is actually not and is being used to obtain personal or important information.
  • Sending an email through multiple accounts in order to make it difficult to trace back the original email's sender address or origin

9. Which of the following reduces spam by rejecting mail from a specific ip addresses?

  • URL Blacklisting
  • DNS Blacklisting
  • IMAP Blacklisting
  • POP3 Blacklisting

10. Antivirus signatures are constructed using with of the following?

  • Encryption Algorithms
  • Random Number Generators
  • Hashes
  • Cyclic Redundancy Checks
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook