Cyber Security Multiple Choice Questions on “Email Security”.
1. There are _______ major ways of stealing email information.
a) 2
b) 3
c) 4
d) 5
Answer: b
Clarification: There are three major ways of stealing email information. These are by stealing cookies, social engineering and password phishing technique.
2. Which of them is not a major way of stealing email information?
a) Stealing cookies
b) Reverse Engineering
c) Password Phishing
d) Social Engineering
Answer: b
Clarification: There are three major ways of stealing email information. These are by stealing cookies, social engineering and password phishing technique. Reverse engineering is not a way of stealing email information.
3. ____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.
a) Email security
b) Email hacking
c) Email protection
d) Email safeguarding
Answer: a
Clarification: Email security is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.
4. _____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.
a) Cloud
b) Pen drive
c) Website
d) Email
Answer: d
Clarification: Email is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks and to entice recipients in divulging sensitive information, by open attachments and/or by clicking on hyperlinks which in background install malware on the victim’s device.
5. Which of them is not a proper method for email security?
a) Use Strong password
b) Use email Encryption
c) Spam filters and malware scanners
d) Click on unknown links to explore
Answer: d
Clarification: Use of strong passwords and email encryption other than planting spam filters and installing malware scanners are some of the proper methods for email security.
6. If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.
a) True
b) False
Answer: a
Clarification: If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. This helps in initiating cookie stealing attack.
7. The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.
a) attackers, malware
b) hackers, antivirus
c) penetration testers, malware
d) penetration testers, virus
Answer: a
Clarification: If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. This stored cookie which contains all your personal data about that website can be stolen away by attackers using malware or trojans.
8. If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.
a) memory
b) quarantine
c) cookies
d) hard drive
Answer: c
Clarification: If the data stored in the cookies is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.
9. Which of the following is a non-technical type of intrusion or attack technique?
a) Reverse Engineering
b) Malware Analysis
c) Social Engineering
d) Malware Writing
Answer: c
Clarification: Social Engineering is a non-technical type of intrusion or attack technique which relies heavily on human interaction. It involves tricking target users to break normal security postures.
10. Which of them is an example of grabbing email information?
a) Cookie stealing
b) Reverse engineering
c) Port scanning
d) Banner grabbing
Answer: a
Clarification: There are three major ways of stealing email information. These are by stealing cookies, social engineering and password phishing technique. The remaining three (in the option) are not ways of stealing email information.
11. _____________ is the technique used for tricking users to disclose their username and passwords through fake pages.
a) Social Engineering
b) Phishing
c) Cookie Stealing
d) Banner Grabbing
Answer: b
Clarification: Phishing is the technique used for tricking users to disclose their username and passwords through fake pages.
12. Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails.
a) trojans, redirected malicious URLs
b) antivirus, patches
c) cracked software, redirected malicious URLs
d) malware, security patches
Answer: a
Clarification: Using email hacking illicit hackers can send & spread malware, trojans, virus, worms, redirected malicious URLs which can take the target recipients to some infected webpage also.
13. Unsolicited Bulk E-mails (UBI) are called __________
a) SMS
b) MMS
c) Spam emails
d) Malicious emails
Answer: c
Clarification: Unsolicited Bulk E-mails (UBI) are an act of sending unwanted emails which one has no specific or important thing in it. Email spams are actually junk emails that are sent by commercial firms as an advertisement of their products and services.
14. Fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information.
a) True
b) False
Answer: a
Clarification: Yes, fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information. Email users must stay aware of such e-frauds.
15. Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as _____________ details _________ and passwords.
a) credit card, antivirus name
b) credit card, login ID
c) cell phone, antivirus name
d) car model, account ID
Answer: b
Clarification: Fraudulent email messages are some fake email messages that seem legitimate which ask for your confidential bank details such as credit card details, cell phone number, Login ID and passwords.