 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Which of the following is not a bulk emailing tool? | 
| A. | Fairlogic Worldcast | 
| B. | 123 Hidden sender | 
| C. | YL Mail Man | 
| D. | NetCut | 
| Answer» E. | |
| 2. | WHICH_OF_THE_FOLLOWING_IS_NOT_A_BULK_EMAILING_TOOL??$ | 
| A. | Fairlogic Worldcast | 
| B. | 123 Hidden sender | 
| C. | YL Mail Man | 
| D. | NetCut | 
| Answer» E. | |
| 3. | Which of the following is not a bulk emailing tool?$ | 
| A. | Wireshark | 
| B. | Sendblaster | 
| C. | Direct Sender | 
| D. | Hotmailer | 
| Answer» B. Sendblaster | |
| 4. | Which of the following is not an anti-spamming tool or system? | 
| A. | Spam-Eater Pro | 
| B. | SpyTech Spam Agent | 
| C. | SpamExperts Desktop | 
| D. | Anti-spyware Tech | 
| Answer» E. | |
| 5. | ___________ is a tool used as spam filter in association with email programs and automatically intercepts spam emails. | 
| A. | Nessus | 
| B. | SpamExpert Desktop | 
| C. | Spam-Rescurer | 
| D. | Burp-Suite | 
| Answer» C. Spam-Rescurer | |
| 6. | Which of the following is not an anti-spam technique? | 
| A. | Reputation control | 
| B. | Sender policy framework | 
| C. | DNS-based block-list | 
| D. | Domain-based blocking | 
| Answer» E. | |
| 7. | Which of the following is not a type of spamming attack? | 
| A. | Page-jacking | 
| B. | Image spamming | 
| C. | Spear phishing | 
| D. | Blog & wiki spamming | 
| Answer» D. Blog & wiki spamming | |
| 8. | There are _______ types of spamming. | 
| A. | 3 | 
| B. | 4 | 
| C. | 5 | 
| D. | 6 | 
| Answer» E. | |
| 9. | There are ___________ major ways of spamming. | 
| A. | 4 | 
| B. | 2 | 
| C. | 3 | 
| D. | 5 | 
| Answer» C. 3 | |
| 10. | Which of the following is not a proper way of how spammers get the email Ids? | 
| A. | When a user registers to online services, blogs, and sites | 
| B. | Databases formed by spiders fetching email Ids from different sources | 
| C. | From offline form fill-up documents | 
| D. | Online ad-tracking tools | 
| Answer» D. Online ad-tracking tools | |
| 11. | ___________ are used which crawl web pages looking for email Ids and copies them to the database. | 
| A. | Caches | 
| B. | Cookies | 
| C. | Bots | 
| D. | Spiders | 
| Answer» E. | |
| 12. | Which of the following is not a technique used by spanners? | 
| A. | Spoofing the domain | 
| B. | Sending attached virus in spams | 
| C. | Junk tags associated with spam-emails | 
| D. | Making important deals through such emails | 
| Answer» E. | |
| 13. | _________________ technique is also used in product advertisement. | 
| A. | Phishing | 
| B. | Cookies | 
| C. | e-Banners | 
| D. | Spamming | 
| Answer» D. Spamming | |
| 14. | ______________ is populating the inbox of any target victim with unsolicited or junk emails. | 
| A. | Phishing | 
| B. | Spamming | 
| C. | Hooking | 
| D. | DoS | 
| Answer» C. Hooking | |