Upwork ANTISPAM AND ANTIVIRUS TEST 2016

Hello Freelancer, Welcome to allupworktestanswers.com Here to get the ANTISPAM AND ANTIVIRUS TEST of Latest version 2016. We are ready here to provide your desire upwork test answer. We already tested all exam test information Available include on here. So Dear, Why Late? Read the below full exam test and get more information from our website. 


1. Which of the following actions can be taken while filtering SMTP spam traffic?
Answers:
  1. Delete the spam mail
  2. Redirect it to the spam mail box
  3. Return it to the sender.
  4. Tag the spam mail
2. Which of the following files are mostly infected?
Answers:
  1. .DOT
  2. .EXE
  3. .COM
  4. .TXT
3. What is the function of MTA(Mail Transfer Agent)?
Answers:
  1. It helps in reading the emails
  2. It receives and delivers the messages
  3. It resolves the names
  4. It detects emails carrying virus
4. What is DHA?
Answers:
  1. Directory Harvest Attack
  2. DNS Harvest Attack
  3. Direct Harvest Attack
  4. Dictionary Harvest Attack
5. How many keys are required if two parties communicate using Symmetric Cryptography?
Answers:
  1. One
  2. Two
  3. Three
  4. Four
6. What is S/MIME?
Answers:
  1. Secure Multipurpose Intranet Mail Extensions
  2. Secure Multipurpose Internet Mail Extensions
  3. Secure Multipurpose Internet Message Extensions
  4. Secure Multipurpose Intranet Message Extensions
7. Which of the following antispam measures are taken to reduce spam?
Answers:
  1. Legislative measures
  2. Organizational measures
  3. Behavioral measures
  4. Technological measures.
  5. All of the above
8. Which of the following are famous worm attacks?
Answers:
  1. MyDoom Worm
  2. Bagle Worm
  3. Netsky Worm
  4. Sasser Worm
  5. All of the above
9. Which of the following techniques are used by spammers to find valid/existent email addresses?
Answers:
  1. SMTP spoofing
  2. SMTP poisioning
  3. DNS poisioning
  4. Directory Harvest Attack
10. Daniel has deployed an antispam solution in his network. Positive detection of non-spam SMTP is called:
Answers:
  1. Negative detection
  2. False positive detection
  3. False negative detection
  4. Untrue detection
11. Which of the following techniques helps in cases of address forgery?
Answers:
  1. SMTP extensions
  2. Cryptographic authentication
  3. Path authentication
  4. Hybrid authentication
12. Which of the following types of virus lives in the boot sector?
Answers:
  1. Sector virus
  2. Parasitic virus
  3. Bootstrap sector
  4. Bootable virus
13. Which of the following is the Symmetric Algorithm used in cryptography?
Answers:
  1. MD4
  2. El Gamal
  3. IDEA
  4. RSA
14. Suppose you got a mail from someone saying that you have won a $1 billion and asking you to give him/her $4000 to claim your prize. Under which category does this type of spam mail lie?
Answers:
  1. Phishing and Fraud
  2. Spoofing mails
  3. Hoaxes
  4. Chain mails
15. What is botnet?
Answers:
  1. A software that runs automatically and autonomously.
  2. A software used for antispam
  3. A software used to manage MTA
  4. A software used to manage MDA
16. Which of the following goals cannot be achieved with the help of Symmetric Cryptography?
Answers:
  1. Nonrepudiation
  2. Confidentiality
  3. Integrity
  4. Availability.
17. To which of the following components does the MUA(Mail User Agent) forward the mail while sending it to another host in the e-mail flow?
Answers:
  1. Mail User Agent
  2. Firewall
  3. Router
  4. Mail Transfer Agent
18. What is the maximum key length of AES?
Answers:
  1. 56
  2. 156
  3. Variable
  4. 256
19. Which of the following are disadvantages of the Symmetric Key Cryptography?
Answers:
  1. Nonrepudiation.
  2. Scalability.
  3. Key distribution.
  4. Security.
20. Which of the following are antivirus measures?
Answers:
  1. Backup all the softwares and data.
  2. Disable the use of external media like floppies etc
  3. Install antivirus.
  4. If the antivirus does not recognize suspicious items, consult an antivirus professional.
  5. Update antivirus regularly
  6. All of the above
21. Which of the following are the ways through which virus spreads?
Answers:
  1. Floppy Disk
  2. CD
  3. Email attachments
  4. Network connection
  5. All of the above
22. Which of the following are categories of spam mails?
Answers:
  1. Phishing and Fraud
  2. Spoofing mails
  3. Hoaxes
  4. Chain mails
  5. All of the above
23. Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:
Answers:
  1. Negative detection
  2. False positive
  3. False negative
  4. Untrue detection
24. Ques:Which of the following are preventive antivirus measures?
Answers:
  1. Do not open attachments from suspicious sources.
  2. Delete chain and junk mails.
  3. Exercise caution while downloading from the internet
  4. Backup your files.
  5. All of the above
25. Which of the following ports is used by IMAP?
Answers:
  1. 139
  2. 137
  3. 143
  4. 142
  5. 25
26. What are zombies?
Answers:
  1. Antispam solutions.
  2. Remotely controlled hosts.
  3. Antivirus solutions
  4. Hackers
27. How many keys are required if two parties communicate using Asymmetric Cryptography?
Answers:
  1. One
  2. Two
  3. Three
  4. Four
28. Which of the following programs establishes modem connection with pay-per-visit resources?
Answers:
  1. Trojans
  2. Automatic dialers
  3. Worms
  4. Antivirus
29. Suppose you got a mail from the HSBC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?
Answers:
  1. Phishing and fraud.
  2. Chain Mails.
  3. Hoaxes.
  4. Brand spoofing.
30. What is Phishing?
Answers:
  1. Fraudulently acquiring sensitive information.
  2. An encryption technique
  3. An anti-spam technique
  4. A password building technique
31. Which of the following are direct harms caused by spam?
Answers:
  1. Loss of productivity
  2. Increased staff costs
  3. Increased infrastructure costs
  4. Increased downloading costs
  5. All of the above
32. Which of the following is the Hashing Algorithm?
Answers:
  1. AES
  2. 3-DES
  3. DES
  4. MD5
33. Which key is used to decrypt the message in PKI?
Answers:
  1. Public Key.
  2. Private Key.
  3. Pre-shared Secret Key.
  4. Hybrid Key.
34. What is Joe Job?
Answers:
  1. A virus
  2. An antivirus
  3. A spam attack
  4. An antispam
35. Which of the following are Email Security Protocols?
Answers:
  1. S/MIME
  2. PEM
  3. STE
  4. PME
36. Which of the following symmetric algorithms have variable key length?
Answers:
  1. AES
  2. Triple DES
  3. IDEA
  4. Rivest Cipher 4
37. What is Mail Exchanger(MX) Record?
Answers:
  1. Router route.
  2. Record in router.
  3. Record in DNS specifying the internet email route.
  4. Record in DHCP specifying the email route.
38. Which of the following measures should be taken to tackle spam mails?
Answers:
  1. Blocking and accepting on the basis of MTA IP address.
  2. Limiting the number of outgoing e-mails per account
  3. Authentication mechanisms
  4. Spam filtering.
  5. All of the above
39. Which of the following are different categories of viruses?
Answers:
  1. Parasitic
  2. Bootstrap sector
  3. Companion
  4. Link
  5. All of the above
40. What is the function of the Reverse DNS Look up Technique in identifying spam mails?
Answers:
  1. To check the sender’s email server attempting for spoofing
  2. To check the receiver’s email server attempting for spoofing
  3. To check the DNS server validity
41. What is IMAP?
Answers:
  1. Internet Messaging Application
  2. Interanet Messaging Application
  3. Interanet Message Access Protocol
  4. Internet Message Access Protocol
42. Which of the following are threats to Email Security?
Answers:
  1. Viruses
  2. Trojans
  3. Spams
  4. Phishing
  5. All of the above
43. Which of the following symmetric encryption algorithms is/are supported by S/MIME?
Answers:
  1. RSA
  2. DES
  3. 3DES
  4. SHA-1
44. Which of the following are the disadvantages of verification?
Answers:
  1. More complications
  2. Increased internet traffic
  3. Problems in sending valid bulk mails
  4. Insecurity against social engineering.
  5. All of the above
45. How many antivirus programs should be installed on a single system?
Answers:
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
46. Which of the following are indirect harms caused by spam?
Answers:
  1. Malicious payload
  2. Fraud
  3. Loss of reputation
  4. Increased communication costs
  5. All of the above
47. Which of the following are the benefits reaped from spam by those associated with antispam measures?
Answers:
  1. Antispam software sales
  2. Antivirus software sales
  3. Increased revenue from advertising
  4. Bandwidth sales
  5. All of the above
48. What does “RBL” stands for in Email Security?
Answers:
  1. Realtime Blacking List
  2. Realtime Blocking List
  3. Realtime Blockhole List
  4. Realtime Blackhole List
49. Dave is fetching mails from a server lying at a remote location. Which protocol is he using to fetch the mails?
Answers:
  1. SMTP
  2. HTTP
  3. SSL
  4. S/MIME
  5. POP3
50. Which of the following programs is used by a user to send and receive emails?
Answers:
  1. Mail Transfer Agent
  2. Mail Delivery Agent
  3. Mail User Agent
  4. Mail Reading Agent
51. Which of the following are different types of spam filtering methods?
Answers:
  1. Blacklisting
  2. Rule based filtering
  3. Signature based filtering
  4. Bayesian filtering
  5. All of the above
52. Which of the following is used in a Directory Harvest Attack?
Answers:
  1. Worms
  2. Brute Force
  3. Trojans
  4. Viruses
53. Which of the following resembles the Joe Job attack?
Answers:
  1. A virus outbreak on the mail server
  2. Finding valid/existent email addresses
  3. Crashing of the mail server
  4. A spam attack that uses spoofed sender data and tarnishes the apparent sender’s reputation
54. Which of the following is an asymmetric algorithm?
Answers:
  1. MD5
  2. El Gamal
  3. IDEA
  4. SHA-1
55. Which of the following is used to entangle spammers?
Answers:
  1. MDA
  2. Spam mails
  3. Trojans
  4. Honey pots
56. Which of the following protocols is used on the sender side when an electronic mail is sent from one host to another?
Answers:
  1. SMTP
  2. POP3
  3. HTTP
  4. SSL
  5. TLS
57. Which of the following techniques are used to identify spam mails?
Answers:
  1. Blacklists/Whitelists
  2. Integrity Check
  3. Heuristics
  4. Content Filtering
  5. Reverse DNS lookup
  6. All of the above
58. Which of the following actions can be taken while filtering POP3 spam traffic?
Answers:
  1. Delete the spam mail
  2. Redirect it to the spam mail box
  3. Return it to the sender.
  4. Tag the spam mail
59. Which of the following is used to control zombies?
Answers:
  1. Viruses
  2. Worms
  3. Trojan horses
  4. Spam mails
Finally no more words require about the ANTISPAM AND ANTIVIRUS TEST  information in this session of this content. If you are require knowing more, Please ask to us via our contact us form or comment box. Please make sure that, you don’t send Personal information via the Comment box.  Thank you very mutch for being with us.

0 comments: