250+ TOP MCQs on Email Security and Answers

Cyber Security Multiple Choice Questions on “Email Security”.

1. There are _______ major ways of stealing email information.
a) 2
b) 3
c) 4
d) 5

Answer: b
Clarification: There are three major ways of stealing email information. These are by stealing cookies, social engineering and password phishing technique.

2. Which of them is not a major way of stealing email information?
a) Stealing cookies
b) Reverse Engineering
c) Password Phishing
d) Social Engineering

Answer: b
Clarification: There are three major ways of stealing email information. These are by stealing cookies, social engineering and password phishing technique. Reverse engineering is not a way of stealing email information.

3. ____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.
a) Email security
b) Email hacking
c) Email protection
d) Email safeguarding

Answer: a
Clarification: Email security is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.

4. _____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.
a) Cloud
b) Pen drive
c) Website
d) Email

Answer: d
Clarification: Email is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks and to entice recipients in divulging sensitive information, by open attachments and/or by clicking on hyperlinks which in background install malware on the victim’s device.

5. Which of them is not a proper method for email security?
a) Use Strong password
b) Use email Encryption
c) Spam filters and malware scanners
d) Click on unknown links to explore

Answer: d
Clarification: Use of strong passwords and email encryption other than planting spam filters and installing malware scanners are some of the proper methods for email security.

6. If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.
a) True
b) False

Answer: a
Clarification: If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. This helps in initiating cookie stealing attack.

7. The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.
a) attackers, malware
b) hackers, antivirus
c) penetration testers, malware
d) penetration testers, virus

Answer: a
Clarification: If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. This stored cookie which contains all your personal data about that website can be stolen away by attackers using malware or trojans.

8. If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.
a) memory
b) quarantine
c) cookies
d) hard drive

Answer: c
Clarification: If the data stored in the cookies is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.

9. Which of the following is a non-technical type of intrusion or attack technique?
a) Reverse Engineering
b) Malware Analysis
c) Social Engineering
d) Malware Writing

Answer: c
Clarification: Social Engineering is a non-technical type of intrusion or attack technique which relies heavily on human interaction. It involves tricking target users to break normal security postures.

10. Which of them is an example of grabbing email information?
a) Cookie stealing
b) Reverse engineering
c) Port scanning
d) Banner grabbing

Answer: a
Clarification: There are three major ways of stealing email information. These are by stealing cookies, social engineering and password phishing technique. The remaining three (in the option) are not ways of stealing email information.

11. _____________ is the technique used for tricking users to disclose their username and passwords through fake pages.
a) Social Engineering
b) Phishing
c) Cookie Stealing
d) Banner Grabbing

Answer: b
Clarification: Phishing is the technique used for tricking users to disclose their username and passwords through fake pages.

12. Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails.
a) trojans, redirected malicious URLs
b) antivirus, patches
c) cracked software, redirected malicious URLs
d) malware, security patches

Answer: a
Clarification: Using email hacking illicit hackers can send & spread malware, trojans, virus, worms, redirected malicious URLs which can take the target recipients to some infected webpage also.

13. Unsolicited Bulk E-mails (UBI) are called __________
a) SMS
b) MMS
c) Spam emails
d) Malicious emails

Answer: c
Clarification: Unsolicited Bulk E-mails (UBI) are an act of sending unwanted emails which one has no specific or important thing in it. Email spams are actually junk emails that are sent by commercial firms as an advertisement of their products and services.

14. Fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information.
a) True
b) False

Answer: a
Clarification: Yes, fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information. Email users must stay aware of such e-frauds.

15. Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as _____________ details _________ and passwords.
a) credit card, antivirus name
b) credit card, login ID
c) cell phone, antivirus name
d) car model, account ID

Answer: b
Clarification: Fraudulent email messages are some fake email messages that seem legitimate which ask for your confidential bank details such as credit card details, cell phone number, Login ID and passwords.

250+ TOP MCQs on Web Server Attacks and Answers

Cyber Security Multiple Choice Questions on “Web Server Attacks”.

1. Which of the following is not an appropriate way to compromise web servers?
a) Misconfiguration in OS
b) Using network vulnerabilities
c) Misconfiguration in networks
d) Bugs in OS which allow commands to run on web servers

Answer: b
Clarification: Websites get hosted on web servers. Web servers are actually computers running that makes us available & accessible files (web pages) through the internet. Various ways that can help compromise a web server are a misconfiguration of network or OS, bugs in web server’s OS etc.

2. Which of the following is not an appropriate method of defacing web server?
a) Fetching credentials through MiTM
b) Brute-forcing Admin Password
c) IP address spoofing
d) DNS Attack through cache poisoning

Answer: c
Clarification: Various ways which can help a hacker deface the web server. These are by fetching credentials through MiTM, brute-forcing administrator password, DNS attack through cache poisoning, FTP server intrusion and many more.

3. Which of the following is not an appropriate method of defacing web server?
a) Mail server intrusion
b) Web application bugs
c) Web shares misconfiguration
d) Sessions hijacking

Answer: d
Clarification: Defacing the web server can be done in various ways by fetching credentials through brute-forcing administrator password, through cache poisoning, mail server intrusion, web app bugs and many more.

4. _________ is one of the most widely used web server platforms.
a) IIS
b) IAS
c) ISS
d) AIS

Answer: a
Clarification: Websites get hosted on web servers. Web servers are actually computers running that makes us available & accessible files (web pages) through the internet. IIS is one of the most widely used web server platforms.

5. IIS stands for __________________
a) Interconnected Information Server
b) Interconnected Information Services
c) Internet Information Server
d) Internet Information Services

Answer: d
Clarification: Web servers are actually computers running that makes us available & accessible files (web pages) through the internet. The most widely used web server platform is the IIS (Internet Information Services).

6. ____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote PC.
a) Spyware
b) ASP Trojan
c) Web ransomware
d) Stuxnet

Answer: b
Clarification: ASP Trojan is a tiny script that if uploaded to a web server can give hacker complete control of remote PC. ASP Trojan can be easily attached to web applications creating a backdoor in web server hacking.

7. ____________ logs all the visits in log files which is located at <%systemroot%>logfiles.
a) IIS
b) Microsoft Server
c) Linux
d) IAS

Answer: a
Clarification: Internet Information Services logs all the visits in log files which are located at <%systemroot%>logfiles. IIS (Internet Information Services) is one of the most widely used web server platforms.

8. Which of the following is not a web server attack type?
a) DOS attack
b) Website Defacement using SQLi
c) Directory Traversal
d) Password guessing

Answer: d
Clarification: The web servers are actually computers running that makes us available & accessible files (web pages) through the internet. Different web server attack types are through DOS attack, website defacement using SQLi and directory traversal.

9. ______________ tool clears the log entries in the IIS log files filtered by an IP address.
a) CleanIISLoging
b) CleanLogger
c) CleanIISLog
d) ClearIISLog

Answer: c
Clarification: IIS (Internet Information Services) is one of the most widely used web server platform. IIS logs all the visits in log files which are located at <%systemroot%>logfiles. CleanIISLog tool clears the log entries in the IIS log files filtered by an IP address.

10. CleanIISLog is not a hacking tool.
a) True
b) False

Answer: b
Clarification: CleanIISLog tool is used to clear the log entries in the IIS log files filtered by an IP address. It is a hacking tool which can help in easily remove all traces of her log file from the server.

11. Which of the following is not an appropriate countermeasure for web server hacking?
a) Patch updates need to be done regularly
b) Not to use default configurations
c) Use IDS and firewalls with signature updates
d) Use low-speed internet

Answer: d
Clarification: To protect against web server hacking, one need to patch updates regularly, not to use default configurations, use IDS and firewalls with signature updates.

12. Which of the following is not an appropriate countermeasure for web server hacking?
a) Using OS or antivirus without updates
b) Scan web server applications for vulnerabilities
c) Using secure protocols
d) Follow strict access control policy

Answer: a
Clarification: For defending against web server hacking, one needs to scan web server applications for vulnerabilities, make use of secure protocols, and follow strict access control policy.

250+ TOP MCQs on Deep Web and Darknet and Answers

Cyber Security Multiple Choice Questions on “Deep Web and Darknet”.

1. The ____________ is anything which your search engine cannot search.
a) Haunted web
b) World Wide Web
c) Surface web
d) Deep Web

Answer: d
Clarification: The Deep Web is anything which your search engine cannot search. Whereas, the surface web is that part of the web which can be indexed by any popular search engine.

2. The ______________ is categorized as an unknown segment of the Deep Web which has been purposely kept hidden & is inaccessible using standard web browsers.
a) Haunted web
b) World Wide Web
c) Dark web
d) Surface web

Answer: c
Clarification: The Dark web is categorized as an unknown segment of the Deep Web which has been purposely kept hidden & is inaccessible using standard web browsers.

3. ________________ is a network construct over the internet that is encrypted. It offers anonymity to its users. Tor (The Onion Router) is a common service of Darknet.
a) Freenet
b) Darknet
c) ARPANET
d) Stuxnet

Answer: b
Clarification: Darknet is a network construct over the internet that is encrypted. It offers anonymity to its users. Tor (The Onion Router) is a common service of Darknet.

4. A special tool is necessary for entering the network which is _______________ that helps the anonymous internet users to access into the Tor’s network and use various Tor services.
a) Opera browser
b) Mozilla browser
c) Chrome browser
d) Tor browser

Answer: d
Clarification: Special tool is necessary for entering the network which is a Tor browser that helps the anonymous internet users to access into the Tor’s network and use various Tor services.

5. ____________ is also a part of darknet that is employed for transferring files anonymously.
a) Freenet
b) Darknet
c) ARPANET
d) Stuxnet

Answer: a
Clarification: A network construct over the internet that is encrypted and not always accessible is the darknet. It offers anonymity to its users. Freenet is also a part of darknet that is employed for transferring files anonymously.

6. One example of a popular website on ______________ is the silk-road that was used to sell drugs that were later taken down by the FBI.
a) Freenet
b) Darknet
c) ARPANET
d) Stuxnet

Answer: b
Clarification: Darknet offers anonymity to its users. It has a collection of websites with special anonymous features. One example of a popular website on darknet is the silk-road that was used to sell drug which was later taken down by the FBI.

7. Deep web is also known as ______________
a) Freenet
b) Darknet
c) ARPANET
d) Hidden web

Answer: d
Clarification: Deep Web is also known as the hidden web. Whereas, the surface web is that part of the web which can be indexed by any popular search engine. This invisible web is not indexed by standard search engines.

8. The popular computer scientist _____________ has coined the term “deep web” in the year 2001.
a) Mr. Tim B. Lee
b) Mr. Narcos Maralli
c) Mr. Michael K. Bergman
d) Mr. Ken Thompson

Answer: c
Clarification: The popular computer scientist Mr. Michael K. Bergman has coined the term “deep web” in the year 2001. The Deep Web is anything which your search engine cannot search.

9. The popular computer scientist Mr. Michael K. Bergman has coined the term “deep web” in the year ____________
a) 2000
b) 2001
c) 2002
d) 2003

Answer: b
Clarification: The popular computer scientist Mr. Michael K. Bergman has coined the term “deep web” in the year 2001. This invisible web uses the encrypted browser and search engines and so is not indexed by standard search engine.

10. The __________ was a huge marketplace of Dark Web specifically famous for selling of illegal drugs & narcotics as well as you can find a wide range of other goods for sale.
a) Silk Road
b) Cotton Road
c) Dark Road
d) Drug Road

Answer: a
Clarification: The Silk Road was a huge marketplace of Dark Web specifically famous for selling of illegal drugs & narcotics as well as you can find a wide range of other goods for sale.

11. Your online activity can still be tracked even if you use different Tor services, but not in much detail.
a) True
b) False

Answer: a
Clarification: The Tor browser helps the anonymous internet users to access into the Tor’s network & use various Tor services. Though it preserves your anonymity your online activity can still be tracked even if you use different Tor services, but not in much detail.

12. Tor (The Onion Router) is not a service or part of the darknet.
a) True
b) False

Answer: b
Clarification: Tor (The Onion Router) is not a service or part of the darknet. A special tool is necessary for entering the network which is a Tor browser that helps the anonymous internet users to access into the Tor’s network and use various Tor services.

250+ TOP MCQs on Hacking Terminologies and Answers

Cyber Security Multiple Choice Questions on “Hacking Terminologies”.

1. ________ is any action that might compromise cyber-security.
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: a
Clarification: Threat can be termed as a possible danger that may lead to breach the cyber security and may cause possible harm to the system or the network.

2. Existence of weakness in a system or network is called _______
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: b
Clarification: Vulnerability is the term used to define weakness in any network or system that can get exploited by an attacker. Exploiting the weakness can lead to the unexpected & undesirable event in cyber security.

3. When any IT product, system or network is in need for testing for security reasons, then the term used is called _________
a) Threat
b) Vulnerability
c) Target of Evaluation
d) Attack

Answer: c
Clarification: Target of Evaluation is the term used when any IT infrastructure, system, network require evaluation for security reasons or for fixing any bugs after being tested by penetration testers.

4. An/A ________ is an act that violates cyber-security.
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: d
Clarification: An “attack” or “cyber-attack” is an attempt taken by attackers to alter, delete, steal or expose any specific data by gaining unauthorized access.

5. ________ is a way to breach the security by using the vulnerability of that system.
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: c
Clarification: An exploit can be any data, piece of code, a program, sequence of commands or any software that uses the vulnerability or flaw of a system and helps attackers or cyber-criminals cause unanticipated behaviour.

6. _________ is an act of hacking by the means of which a political or social message is conveyed.
a) Hacktivism
b) Whistle-blowing
c) Surveillance
d) Pseudonymization

Answer: a
Clarification: Hacktivism is an act of defacing a website, or any network or system. Systems and networks are compromised with a political or social agenda.

7. _______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.
a) Data copying
b) Data masking
c) Data breaching
d) Data duplicating

Answer: b
Clarification: Data masking is the method used for developing or creating a structurally similar version of data of any organization that is not authentic. These types of unauthentic data are purposefully created for protecting the actual data.

8. Data masking is also known as _________
a) Data obfuscation
b) Data copying
c) Data breaching
d) Data duplicating

Answer: a
Clarification: Data obfuscation is the alternate term used for data masking, that is used for developing or creating a structurally similar version of data of any organization that is not authentic. These types of unauthentic data are purposefully created for protecting the actual data.

9. ________ automates an action or attack so that repetitive tasks are done at a faster rate.
a) Auto-bots
b) Cookie-bots
c) Robots
d) Bots

Answer: d
Clarification: Bots are a set of codes written which helps to perform repetitive tasks at a much faster rate than humans.

10. Backdoors are also known as ____________
a) Trap doors
b) Front doors
c) Cover doors
d) Back entry

Answer: a
Clarification: Trap-doors are hidden entry points in any already hacked system that is set to bypass security measures.

11. Adware are pre-chosen _______ developed to display ads.
a) banner
b) software
c) malware
d) shareware

Answer: b
Clarification: Adware is software that is displayed on system or web pages for showing pre-chosen ads.

12. ________ is an attack technique occurs when excess data gets written to a memory block.
a) Over buffering
b) Buffering
c) Buffer overflow
d) Memory full

Answer: c
Clarification: Buffer overflow is a flaw that occurs in memory when excessive data is written which makes the buffer allocated to seize.

13. Finding & publishing any user’s identity with the help of different personal details is called ________
a) Doxing
b) Data breaching
c) Personal data copying
d) Secure File Transferring Protocol

Answer: a
Clarification: When an identity of internet user is discovered and published by following his/her details over the internet is called doxing.

14. In IP address, IP is abbreviated as __________
a) Internet Program
b) Internet Protocol
c) Intuition Programs
d) Internet Pathway

Answer: b
Clarification: In IP Address, IP is abbreviated as Internet Protocol. It acts as a unique address or identifier of any computer or device in the internet.

15. Whaling is the technique used to take deep and _________ information about any individual.
a) sensitive
b) powerful
c) useless
d) casual

Answer: a
Clarification: Whaling uses phishing technique which helps hackers in stealing deep and sensitive information about any member of an organization. The information can be private addresses, phone number, future plans and projects, salary and bonuses.

250+ TOP MCQs on Popular Tools used in Security and Answers

Cyber Security Multiple Choice Questions on “Popular Tools used in Security”.

1. Which of the following attach is not used by LC4 to recover Windows password?
a) Brute-force attack
b) Dictionary attack
c) MiTM attack
d) Hybrid attacks

Answer: c
Clarification: LC4 is a password auditing and recovery tool; used for testing strength of a password and also helps in recovering lost Microsoft Windows passwords using a hybrid attack, brute-force attack as well as using a dictionary attack.

2. ____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.
a) Wireshark
b) Nessus
c) Snort
d) WebInspect

Answer: b
Clarification: Nessus is a popular and proprietary network vulnerability scanning tool developed by Tenable Network Security. It helps in easily identifying vulnerabilities and fix them, which includes missing patches and software flaws.

3. _____________ is a tool which can detect registry issues in an operating system.
a) Network Stumbler
b) Ettercap
c) Maltego
d) LANguard Network Security Scanner

Answer: d
Clarification: LANguard Network Security Scanner helps in monitoring networks by scanning connected machines to provide information for every node. It can also be used for identifying registry issues.

4. Network Stumbler is a Windows Wi-Fi monitoring tool.
a) True
b) False

Answer: a
Clarification: Network Stumbler is a popular tool that helps in detecting WLANs and helps hackers in finding non-broadcasting wireless networks. It is popularly used as Wi-Fi scanning and monitoring tool for Windows.

5. ToneLoc is abbreviated as __________
a) Tone Locking
b) Tone Locator
c) Tone Locker
d) Tune Locator

Answer: c
Clarification: ToneLoc is a popular and primitive tool written for MS-DOS users. It is basically used by malicious attackers to guess user accounts, finding entry points in modems and locating modems connected in the network.

6. __________ is a debugger and exploration tool.
a) Netdog
b) Netcat
c) Tcpdump
d) BackTrack

Answer: b
Clarification: Netcat is an easy Unix utility that helps in reading and writing data across network connections, using TCP or UDP protocol. It is popularly used as a debugger and exploration tool that is found free for Windows and Mac OS also.

7. __________ is a popular command-line packet analyser.
a) Wireshark
b) Snort
c) Metasploit
d) Tcpdump

Answer: d
Clarification: Tcpdump is a popular command-line network packet analyzer. It allows its user in displaying TCP / IP as well as other data packets being transmitted or received over the computer network.

8. ________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.
a) EventLog Analyser
b) NordVPN
c) Wireshark
d) PacketFilter Analyzer

Answer: a
Clarification: EventLog Analyser is a tool that basically keeps the log of data from networks, devices as well as applications in a single location. Latest encryption techniques are used for securing its stored data.

9. ______________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes.
a) Outlook
b) Nessus
c) Mailbox Exchange Recovery
d) Mail Exchange Recovery toolkit

Answer: c
Clarification: Mailbox Exchange Recovery is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes. This tool is popularly used by ethical hackers and cyber-forensics investigators in recovering emails, calendars, attachments, contacts from inaccessible mail-servers.

10. ________________ helps in protecting businesses against data breaches that may make threats to cloud.
a) Centrify
b) Mailbox Exchange Recovery
c) Nessus
d) Dashline

Answer: a
Clarification: Centrify helps in protecting businesses against data breaches that may make threats to the cloud. This is done by securing Centrify users by providing internal, external and privileged users.

11. __________ is a popular corporate security tool that is used to detect the attack on email with cloud only services.
a) Cain and Abel
b) Proofpoint
c) Angry IP Scanner
d) Ettercap

Answer: b
Clarification: Proofpoint is a popular corporate security tool that is used to detect an attack on email with cloud-only services. It helps firms detect attack vectors and loopholes in different security systems through which attackers may gain access.

12. _____________ helps in protecting corporate data, communications and other assets.
a) Snort
b) CipherCloud
c) Burp Suit
d) Wireshark

Answer: b
Clarification: CipherCloud helps in protecting corporate data, different communications as well as other assets. This includes anti-virus scanning facility, encryption & traffic monitoring. In addition, it provides mobile security support also.

250+ TOP MCQs on Email Security and Answers

Cyber Security Questions and Answers for Entrance exams on “Email Security”.

1. Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)?
a) Zeus
b) Stuxnet
c) Reaper Exploit
d) Friday the 13

Answer: c
Clarification: Reaper exploit is a micro-virus that can compromise the email security as it works in the background and sends a copy of reply or forwarded the email to its creator or sender.

2. Email users who use IE as their _________________ are vulnerable to Reaper Exploit.
a) Web engine
b) Rendering engine
c) Game engine
d) HTML engine

Answer: d
Clarification: Email users who use Internet Explorer as their HTML engine are vulnerable to Reaper Exploit. It works in the background and sends a copy of a reply or forwarded the email to its creator or sender.

3. _______________ needs to be turned off in order to prevent from this attack.
a) Email scripting
b) Email attachments
c) Email services
d) Third party email programs

Answer: a
Clarification: Email users who use Internet Explorer as their HTML engine are vulnerable to Reaper Exploit. It works in the background and sends a copy of a reply or forwarded the email to its creator or sender. Email scripting needs to be turned off in order to prevent from this attack.

4. Which of the following is a tool to monitor outgoing traffic of target PC’s email and intercept all the emails sent from it?
a) Wireshark
b) Advanced Stealth Email Redirector
c) MS Outlook
d) Cisco Jabber

Answer: b
Clarification: Advanced Stealth Email Redirector is a tool to monitor outgoing traffic of target PC’s email and intercept all the emails send from it. Intercepted emails are then forwarded to a pre-specified email ID.

5. Advanced SER is abbreviated as ___________
a) Advanced Stealth Electronic Redirector
b) Advanced Security Email Redirector
c) Advanced Stealth Email Redirector
d) Advanced Stealth Email Recorder

Answer: c
Clarification: Advanced Stealth Email Redirector (Advanced SER) is a tool to monitor outgoing traffic of target PC’s email and intercept all the emails send from it. Intercepted emails are then forwarded to a pre-specified email ID.

6. Which of the following will not help in preserving email security?
a) Create a strong password
b) Connect your email to a phone number
c) Use two-factor authentication for password verification and login
d) Click on unknown links and sites

Answer: d
Clarification: Some of the following measures to preserve your email security is via creating a strong password, connecting your emails to your personal phone number and set up 2-factor authentication for login.

7. Once the email is compromised, all other sites and services online associated with this email can be compromised.
a) True
b) False

Answer: a
Clarification: Email security is very much necessary because once the email is compromised, all other sites and services online associated with this email can be compromised and the hacker will be able to access all other accounts linked to this email.

8. _____________ is an encryption program or add-ons which provides cryptographic privacy & authentication for email communication.
a) Powerful Good Privacy
b) Pretty Good Privacy
c) Pretty Good Encryption
d) Pretty Strong Encryption

Answer: b
Clarification: Pretty Good Privacy is an encryption program which provides cryptographic privacy & authentication for email communication. Basically, it is used for securing user’s texts, emails, attachments etc.

9. PGP is abbreviated as _______________
a) Pretty Good Privacy
b) Powerful Good Privacy
c) Protocol Giving Privacy
d) Pretty Good Protocol

Answer: a
Clarification: Pretty Good Privacy (PGP) is an encryption program which provides cryptographic privacy & authentication for email communication. Basically, it is used for securing user’s texts, emails, attachments etc.

10. Which of them is not an example of business email security tool?
a) Microsoft Office Trust Center
b) Sendinc
c) Hushmail Business
d) Cisco Jabber

Answer: d
Clarification: Cisco Jabber is a unified communications application that lets users access, send instant messaging, voice, voice messaging, desktop sharing, & conferencing. The rest three are a business email security tools.

11. Which of them is not an example of business email security tool?
a) Enlocked
b) RPost Office
c) MS Outlook
d) Sendinc

Answer: c
Clarification: MS Outlook is a web-based desktop app as well as an online suite of webmail, tasks, contacts & calendaring services developed by Microsoft. The rest three are a business email security tools.

12. ________________ is a free extension of browser that enables you in decrypting as well as encrypting emails.
a) Enlocked
b) MS Outlook
c) Cisco Jabber
d) Mailvelope

Answer: d
Clarification: Mailvelope is a free extension of the browser (which is available for both Google Chrome as well as Mozilla Firefox) that enables users in decrypting as well as encrypting emails using an openPGP standard of encryption.

13. Which of the following is not an email related hacking tool?
a) Email Finder Pro
b) Sendinc
c) Mail PassView
d) Mail Password

Answer: b
Clarification: Sendinc is not an email data compromising tool. It is used for securing business email accounts and offers a quick web-based way to jump into offering secure emails for firms. The rest three are email compromising tools.

14. _______________ is targeted bulk email marketing software.
a) Email Spider Toolkit
b) Email Spider Easy
c) Email Crawler Easy
d) Email Spider Toolkit

Answer: b
Clarification: Email Spider Easy is targeted bulk email marketing software. It rapidly & automatically searches & spider from the search engine for finding email addresses. This tool is integrated with top search engines.

15. ______________ is a tool that is integrated with top 90 search engines to grab quick search for email addresses and other details.
a) Email Spider Toolkit
b) Email Spider Easy
c) Email Crawler Easy
d) Email Spider Toolkit

Answer: b
Clarification: Email Spider Easy is targeted bulk email marketing software. It rapidly & automatically searches & spider from the search engine for finding email addresses. This tool is integrated with top search engines & its speed allows up to 500 email extraction threads simultaneously.

16. MegaHackerZ helps crackers to crack email passwords.
a) True
b) False

Answer: a
Clarification: MegaHackerZ helps crackers to crack email passwords. Though it is not used very much as the versions are deprecated. But it is still useful for weak passwords to crack easily.