Do you know that? 46% like freelancing because there is no chance of lay off next

Contact Email: teammmrem@yahoo.com

<< All Upwork (oDesk) and Elance Tests << Upwork (oDesk) test answers << Networking category

Test answers for Antispam and Antivirus Test 2016

(59 / 1) Last updated: January 27
Upwork (oDesk) • Networking
Questions and answers are regularly updated. Answered and not answered tests questions.

This helps getting job: Hundreds of (cover letter examples , interview questions , profile samples ) • Earn on Upwork (oDesk)
Job assistance: jobs popularityfreelance rates

Popular test answers: HTML, .Net, CSS, English, SEO, Photoshop, iOS, Java, Android, Ruby, Python, JavaScript

See all 6 tests answers updated

Find Upwork (oDesk) and Elance test answers on this website:



Collapse | Expand

59 Answered Test Questions:

1. Which of the following actions can be taken while filtering SMTP spam traffic?

Answers:

• Delete the spam mail

• Redirect it to the spam mail box

• Return it to the sender.

• Tag the spam mail

2. Which of the following files are mostly infected?

Answers:

• .DOT

• .EXE

• .COM

• .TXT

3. What is the function of MTA(Mail Transfer Agent)?

Answers:

• It helps in reading the emails

• It receives and delivers the messages

• It resolves the names

• It detects emails carrying virus

4. What is DHA?

Answers:

• Directory Harvest Attack

• DNS Harvest Attack

• Direct Harvest Attack

• Dictionary Harvest Attack

5. How many keys are required if two parties communicate using Symmetric Cryptography?

Answers:

• One

• Two

• Three

• Four

6. What is S/MIME?

Answers:

• Secure Multipurpose Intranet Mail Extensions

• Secure Multipurpose Internet Mail Extensions

• Secure Multipurpose Internet Message Extensions

• Secure Multipurpose Intranet Message Extensions

7. Which of the following antispam measures are taken to reduce spam?

Answers:

• Legislative measures

• Organizational measures

• Behavioral measures

• Technological measures.

• All of the above

8. Which of the following are famous worm attacks?

Answers:

• MyDoom Worm

• Bagle Worm

• Netsky Worm

• Sasser Worm

• All of the above

9. Which of the following techniques are used by spammers to find valid/existent email addresses?

Answers:

• SMTP spoofing

• SMTP poisioning

• DNS poisioning

• Directory Harvest Attack

10. Daniel has deployed an antispam solution in his network. Positive detection of non-spam SMTP is called:

Answers:

• Negative detection

• False positive detection

• False negative detection

• Untrue detection

11. Which of the following techniques helps in cases of address forgery?

Answers:

• SMTP extensions

• Cryptographic authentication

• Path authentication

• Hybrid authentication

12. Which of the following types of virus lives in the boot sector?

Answers:

• Sector virus

• Parasitic virus

• Bootstrap sector

• Bootable virus

13. Which of the following is the Symmetric Algorithm used in cryptography?

Answers:

• MD4

• El Gamal

• IDEA

• RSA

14. Suppose you got a mail from someone saying that you have won a $1 billion and asking you to give him/her $4000 to claim your prize. Under which category does this type of spam mail lie?

Answers:

• Phishing and Fraud

• Spoofing mails

• Hoaxes

• Chain mails

15. What is botnet?

Answers:

• A software that runs automatically and autonomously.

• A software used for antispam

• A software used to manage MTA

• A software used to manage MDA

16. Which of the following goals cannot be achieved with the help of Symmetric Cryptography?

Answers:

• Nonrepudiation

• Confidentiality

• Integrity

• Availability.

17. To which of the following components does the MUA(Mail User Agent) forward the mail while sending it to another host in the e-mail flow?

Answers:

• Mail User Agent

• Firewall

• Router

• Mail Transfer Agent

18. What is the maximum key length of AES?

Answers:

• 56

• 156

• Variable

• 256

19. Which of the following are disadvantages of the Symmetric Key Cryptography?

Answers:

• Nonrepudiation.

• Scalability.

• Key distribution.

• Security.

20. Which of the following are antivirus measures?

Answers:

• Backup all the softwares and data.

• Disable the use of external media like floppies etc

• Install antivirus.

• If the antivirus does not recognize suspicious items, consult an antivirus professional.

• Update antivirus regularly

• All of the above

21. Which of the following are the ways through which virus spreads?

Answers:

• Floppy Disk

• CD

• Email attachments

• Network connection

• All of the above

22. Which of the following are categories of spam mails?

Answers:

• Phishing and Fraud

• Spoofing mails

• Hoaxes

• Chain mails

• All of the above

23. Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:

Answers:

• Negative detection

• False positive

• False negative

• Untrue detection

24. Ques:Which of the following are preventive antivirus measures?

Answers:

• Do not open attachments from suspicious sources.

• Delete chain and junk mails.

• Exercise caution while downloading from the internet

• Backup your files.

• All of the above

25. Which of the following ports is used by IMAP?

Answers:

• 139

• 137

• 143

• 142

• 25

26. What are zombies?

Answers:

• Antispam solutions.

• Remotely controlled hosts.

• Antivirus solutions

• Hackers

27. How many keys are required if two parties communicate using Asymmetric Cryptography?

Answers:

• One

• Two

• Three

• Four

28. Which of the following programs establishes modem connection with pay-per-visit resources?

Answers:

• Trojans

• Automatic dialers

• Worms

• Antivirus

29. Suppose you got a mail from the HSBC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?

Answers:

• Phishing and fraud.

• Chain Mails.

• Hoaxes.

• Brand spoofing.

30. What is Phishing?

Answers:

• Fraudulently acquiring sensitive information.

• An encryption technique

• An anti-spam technique

• A password building technique

31. Which of the following are direct harms caused by spam?

Answers:

• Loss of productivity

• Increased staff costs

• Increased infrastructure costs

• Increased downloading costs

• All of the above

32. Which of the following is the Hashing Algorithm?

Answers:

• AES

• 3-DES

• DES

• MD5

33. Which key is used to decrypt the message in PKI?

Answers:

• Public Key.

• Private Key.

• Pre-shared Secret Key.

• Hybrid Key.

34. What is Joe Job?

Answers:

• A virus

• An antivirus

• A spam attack

• An antispam

35. Which of the following are Email Security Protocols?

Answers:

• S/MIME

• PEM

• STE

• PME

36. Which of the following symmetric algorithms have variable key length?

Answers:

• AES

• Triple DES

• IDEA

• Rivest Cipher 4

37. What is Mail Exchanger(MX) Record?

Answers:

• Router route.

• Record in router.

• Record in DNS specifying the internet email route.

• Record in DHCP specifying the email route.

38. Which of the following measures should be taken to tackle spam mails?

Answers:

• Blocking and accepting on the basis of MTA IP address.

• Limiting the number of outgoing e-mails per account

• Authentication mechanisms

• Spam filtering.

• All of the above

39. Which of the following are different categories of viruses?

Answers:

• Parasitic

• Bootstrap sector

• Companion

• Link

• All of the above

40. What is the function of the Reverse DNS Look up Technique in identifying spam mails?

Answers:

• To check the sender's email server attempting for spoofing

• To check the receiver's email server attempting for spoofing

• To check the DNS server validity

41. What is IMAP?

Answers:

• Internet Messaging Application

• Interanet Messaging Application

• Interanet Message Access Protocol

• Internet Message Access Protocol

42. Which of the following are threats to Email Security?

Answers:

• Viruses

• Trojans

• Spams

• Phishing

• All of the above

43. Which of the following symmetric encryption algorithms is/are supported by S/MIME?

Answers:

• RSA

• DES

• 3DES

• SHA-1

44. Which of the following are the disadvantages of verification?

Answers:

• More complications

• Increased internet traffic

• Problems in sending valid bulk mails

• Insecurity against social engineering.

• All of the above

45. How many antivirus programs should be installed on a single system?

Answers:

• 1

• 2

• 3

• 4

• 5

46. Which of the following are indirect harms caused by spam?

Answers:

• Malicious payload

• Fraud

• Loss of reputation

• Increased communication costs

• All of the above

47. Which of the following are the benefits reaped from spam by those associated with antispam measures?

Answers:

• Antispam software sales

• Antivirus software sales

• Increased revenue from advertising

• Bandwidth sales

• All of the above

48. What does "RBL" stands for in Email Security?

Answers:

• Realtime Blacking List

• Realtime Blocking List

• Realtime Blockhole List

• Realtime Blackhole List

49. Dave is fetching mails from a server lying at a remote location. Which protocol is he using to fetch the mails?

Answers:

• SMTP

• HTTP

• SSL

• S/MIME

• POP3

50. Which of the following programs is used by a user to send and receive emails?

Answers:

• Mail Transfer Agent

• Mail Delivery Agent

• Mail User Agent

• Mail Reading Agent

51. Which of the following are different types of spam filtering methods?

Answers:

• Blacklisting

• Rule based filtering

• Signature based filtering

• Bayesian filtering

• All of the above

52. Which of the following is used in a Directory Harvest Attack?

Answers:

• Worms

• Brute Force

• Trojans

• Viruses

53. Which of the following resembles the Joe Job attack?

Answers:

• A virus outbreak on the mail server

• Finding valid/existent email addresses

• Crashing of the mail server

• A spam attack that uses spoofed sender data and tarnishes the apparent sender's reputation

54. Which of the following is an asymmetric algorithm?

Answers:

• MD5

• El Gamal

• IDEA

• SHA-1

55. Which of the following is used to entangle spammers?

Answers:

• MDA

• Spam mails

• Trojans

• Honey pots

56. Which of the following protocols is used on the sender side when an electronic mail is sent from one host to another?

Answers:

• SMTP

• POP3

• HTTP

• SSL

• TLS

57. Which of the following techniques are used to identify spam mails?

Answers:

• Blacklists/Whitelists

• Integrity Check

• Heuristics

• Content Filtering

• Reverse DNS lookup

• All of the above

58. Which of the following actions can be taken while filtering POP3 spam traffic?

Answers:

• Delete the spam mail

• Redirect it to the spam mail box

• Return it to the sender.

• Tag the spam mail

59. Which of the following is used to control zombies?

Answers:

• Viruses

• Worms

• Trojan horses

• Spam mails


1 NOT Answered Yet Test Questions:

(hold on, will be updated soon)
60. Which of the following are malicious code attacks?

Answers:

• Brute force

• Trojan horses

• DDoS

• Viruses

• Malware