Explore topic-wise MCQs in Cyber Security.

This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is not a bulk emailing tool?

A. Fairlogic Worldcast
B. 123 Hidden sender
C. YL Mail Man
D. NetCut
Answer» E.
2.

WHICH_OF_THE_FOLLOWING_IS_NOT_A_BULK_EMAILING_TOOL??$

A. Fairlogic Worldcast
B. 123 Hidden sender
C. YL Mail Man
D. NetCut
Answer» E.
3.

Which of the following is not a bulk emailing tool?$

A. Wireshark
B. Sendblaster
C. Direct Sender
D. Hotmailer
Answer» B. Sendblaster
4.

Which of the following is not an anti-spamming tool or system?

A. Spam-Eater Pro
B. SpyTech Spam Agent
C. SpamExperts Desktop
D. Anti-spyware Tech
Answer» E.
5.

___________ is a tool used as spam filter in association with email programs and automatically intercepts spam emails.

A. Nessus
B. SpamExpert Desktop
C. Spam-Rescurer
D. Burp-Suite
Answer» C. Spam-Rescurer
6.

Which of the following is not an anti-spam technique?

A. Reputation control
B. Sender policy framework
C. DNS-based block-list
D. Domain-based blocking
Answer» E.
7.

Which of the following is not a type of spamming attack?

A. Page-jacking
B. Image spamming
C. Spear phishing
D. Blog & wiki spamming
Answer» D. Blog & wiki spamming
8.

There are _______ types of spamming.

A. 3
B. 4
C. 5
D. 6
Answer» E.
9.

There are ___________ major ways of spamming.

A. 4
B. 2
C. 3
D. 5
Answer» C. 3
10.

Which of the following is not a proper way of how spammers get the email Ids?

A. When a user registers to online services, blogs, and sites
B. Databases formed by spiders fetching email Ids from different sources
C. From offline form fill-up documents
D. Online ad-tracking tools
Answer» D. Online ad-tracking tools
11.

___________ are used which crawl web pages looking for email Ids and copies them to the database.

A. Caches
B. Cookies
C. Bots
D. Spiders
Answer» E.
12.

Which of the following is not a technique used by spanners?

A. Spoofing the domain
B. Sending attached virus in spams
C. Junk tags associated with spam-emails
D. Making important deals through such emails
Answer» E.
13.

_________________ technique is also used in product advertisement.

A. Phishing
B. Cookies
C. e-Banners
D. Spamming
Answer» D. Spamming
14.

______________ is populating the inbox of any target victim with unsolicited or junk emails.

A. Phishing
B. Spamming
C. Hooking
D. DoS
Answer» C. Hooking