

MCQOPTIONS
Saved Bookmarks
This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following is not a bulk emailing tool? |
A. | Fairlogic Worldcast |
B. | 123 Hidden sender |
C. | YL Mail Man |
D. | NetCut |
Answer» E. | |
2. |
WHICH_OF_THE_FOLLOWING_IS_NOT_A_BULK_EMAILING_TOOL??$ |
A. | Fairlogic Worldcast |
B. | 123 Hidden sender |
C. | YL Mail Man |
D. | NetCut |
Answer» E. | |
3. |
Which of the following is not a bulk emailing tool?$ |
A. | Wireshark |
B. | Sendblaster |
C. | Direct Sender |
D. | Hotmailer |
Answer» B. Sendblaster | |
4. |
Which of the following is not an anti-spamming tool or system? |
A. | Spam-Eater Pro |
B. | SpyTech Spam Agent |
C. | SpamExperts Desktop |
D. | Anti-spyware Tech |
Answer» E. | |
5. |
___________ is a tool used as spam filter in association with email programs and automatically intercepts spam emails. |
A. | Nessus |
B. | SpamExpert Desktop |
C. | Spam-Rescurer |
D. | Burp-Suite |
Answer» C. Spam-Rescurer | |
6. |
Which of the following is not an anti-spam technique? |
A. | Reputation control |
B. | Sender policy framework |
C. | DNS-based block-list |
D. | Domain-based blocking |
Answer» E. | |
7. |
Which of the following is not a type of spamming attack? |
A. | Page-jacking |
B. | Image spamming |
C. | Spear phishing |
D. | Blog & wiki spamming |
Answer» D. Blog & wiki spamming | |
8. |
There are _______ types of spamming. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 6 |
Answer» E. | |
9. |
There are ___________ major ways of spamming. |
A. | 4 |
B. | 2 |
C. | 3 |
D. | 5 |
Answer» C. 3 | |
10. |
Which of the following is not a proper way of how spammers get the email Ids? |
A. | When a user registers to online services, blogs, and sites |
B. | Databases formed by spiders fetching email Ids from different sources |
C. | From offline form fill-up documents |
D. | Online ad-tracking tools |
Answer» D. Online ad-tracking tools | |
11. |
___________ are used which crawl web pages looking for email Ids and copies them to the database. |
A. | Caches |
B. | Cookies |
C. | Bots |
D. | Spiders |
Answer» E. | |
12. |
Which of the following is not a technique used by spanners? |
A. | Spoofing the domain |
B. | Sending attached virus in spams |
C. | Junk tags associated with spam-emails |
D. | Making important deals through such emails |
Answer» E. | |
13. |
_________________ technique is also used in product advertisement. |
A. | Phishing |
B. | Cookies |
C. | e-Banners |
D. | Spamming |
Answer» D. Spamming | |
14. |
______________ is populating the inbox of any target victim with unsolicited or junk emails. |
A. | Phishing |
B. | Spamming |
C. | Hooking |
D. | DoS |
Answer» C. Hooking | |