MCQOPTIONS
Saved Bookmarks
This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following is not a bulk emailing tool? |
| A. | Fairlogic Worldcast |
| B. | 123 Hidden sender |
| C. | YL Mail Man |
| D. | NetCut |
| Answer» E. | |
| 2. |
WHICH_OF_THE_FOLLOWING_IS_NOT_A_BULK_EMAILING_TOOL??$ |
| A. | Fairlogic Worldcast |
| B. | 123 Hidden sender |
| C. | YL Mail Man |
| D. | NetCut |
| Answer» E. | |
| 3. |
Which of the following is not a bulk emailing tool?$ |
| A. | Wireshark |
| B. | Sendblaster |
| C. | Direct Sender |
| D. | Hotmailer |
| Answer» B. Sendblaster | |
| 4. |
Which of the following is not an anti-spamming tool or system? |
| A. | Spam-Eater Pro |
| B. | SpyTech Spam Agent |
| C. | SpamExperts Desktop |
| D. | Anti-spyware Tech |
| Answer» E. | |
| 5. |
___________ is a tool used as spam filter in association with email programs and automatically intercepts spam emails. |
| A. | Nessus |
| B. | SpamExpert Desktop |
| C. | Spam-Rescurer |
| D. | Burp-Suite |
| Answer» C. Spam-Rescurer | |
| 6. |
Which of the following is not an anti-spam technique? |
| A. | Reputation control |
| B. | Sender policy framework |
| C. | DNS-based block-list |
| D. | Domain-based blocking |
| Answer» E. | |
| 7. |
Which of the following is not a type of spamming attack? |
| A. | Page-jacking |
| B. | Image spamming |
| C. | Spear phishing |
| D. | Blog & wiki spamming |
| Answer» D. Blog & wiki spamming | |
| 8. |
There are _______ types of spamming. |
| A. | 3 |
| B. | 4 |
| C. | 5 |
| D. | 6 |
| Answer» E. | |
| 9. |
There are ___________ major ways of spamming. |
| A. | 4 |
| B. | 2 |
| C. | 3 |
| D. | 5 |
| Answer» C. 3 | |
| 10. |
Which of the following is not a proper way of how spammers get the email Ids? |
| A. | When a user registers to online services, blogs, and sites |
| B. | Databases formed by spiders fetching email Ids from different sources |
| C. | From offline form fill-up documents |
| D. | Online ad-tracking tools |
| Answer» D. Online ad-tracking tools | |
| 11. |
___________ are used which crawl web pages looking for email Ids and copies them to the database. |
| A. | Caches |
| B. | Cookies |
| C. | Bots |
| D. | Spiders |
| Answer» E. | |
| 12. |
Which of the following is not a technique used by spanners? |
| A. | Spoofing the domain |
| B. | Sending attached virus in spams |
| C. | Junk tags associated with spam-emails |
| D. | Making important deals through such emails |
| Answer» E. | |
| 13. |
_________________ technique is also used in product advertisement. |
| A. | Phishing |
| B. | Cookies |
| C. | e-Banners |
| D. | Spamming |
| Answer» D. Spamming | |
| 14. |
______________ is populating the inbox of any target victim with unsolicited or junk emails. |
| A. | Phishing |
| B. | Spamming |
| C. | Hooking |
| D. | DoS |
| Answer» C. Hooking | |