Cyber Security Multiple Choice Questions on “Attack Vectors – Spamming”.
1. ______________ is populating the inbox of any target victim with unsolicited or junk emails.
a) Phishing
b) Spamming
c) Hooking
d) DoS
Answer: b
Clarification: Spamming is populating the inbox of any target victim with unsolicited or junk emails. These junk emails may contain malicious computer programs that may harm the recipient.
2. _________________ technique is also used in product advertisement.
a) Phishing
b) Cookies
c) e-Banners
d) Spamming
Answer: c
Clarification: Spamming attack over-fills the mail box of the target victim with unwanted spontaneous emails. The technique is also used in product advertisement through mass mailing.
3. Which of the following is not a technique used by spanners?
a) Spoofing the domain
b) Sending attached virus in spams
c) Junk tags associated with spam-emails
d) Making important deals through such emails
Answer: d
Clarification: Spoofing the domain, sending attached virus & junk tags associated with spam-emails are some of the techniques used by spammers. Spam is one of the popular attack techniques.
4. ___________ are used which crawl web pages looking for email Ids and copies them to the database.
a) Caches
b) Cookies
c) Bots
d) Spiders
Answer: d
Clarification: Spiders also known as crawlers are used which crawl different web pages looking for email Ids and copies them to the database. These emails are collected together and used for the purpose of spamming.
5. Which of the following is not a proper way of how spammers get the email Ids?
a) When a user registers to online services, blogs, and sites
b) Databases formed by spiders fetching email Ids from different sources
c) From offline form fill-up documents
d) Online ad-tracking tools
Answer: c
Clarification: Spammers can get email IDs from sources such as data when a user registers to online services, blogs, and sites, databases formed by spiders fetching email Ids from different sources, online ad-tracking tools, email-ID extraction tools, spyware and cookies etc.
6. There are ___________ major ways of spamming.
a) 4
b) 2
c) 3
d) 5
Answer: b
Clarification: There are two major ways of spamming. First, by Usenet spam, where a single message is sent to more than 50 recipients or more Usenet newsgroup, which has become old form of attack. The second one is by email-spam which target individual users and tools are used to send spams directly to them.
7. There are _______ types of spamming.
a) 3
b) 4
c) 5
d) 6
Answer: d
Clarification: Spam attack populates the mail-box of any victim with unwanted emails. There are 6 types of spamming attack. These are by hidden text and links, double-tags, cloaking, blog & wiki spams, image spamming, and page-jacking.
8. Which of the following is not a type of spamming attack?
a) Page-jacking
b) Image spamming
c) Spear phishing
d) Blog & wiki spamming
Answer: c
Clarification: Spear phishing is not an example of a spamming attack. Hidden text & links, double-tags, cloaking, blog & wiki spams, image spamming, and page-jacking are types of spamming attack.
9. Which of the following is not a bulk emailing tool?
a) Fairlogic Worldcast
b) 123 Hidden sender
c) YL Mail Man
d) NetCut
Answer: d
Clarification: Bulk emailing tools are used for sending spams and emails in an uncountable number to flood the recipient’s inbox with junk emails. Fairlogic Worldcast, 123 Hidden sender, YL Mail Man, Sendblaster are examples of bulk emailing tool.
10. Which of the following is not a bulk emailing tool?
a) Wireshark
b) Sendblaster
c) Direct Sender
d) Hotmailer
Answer: a
Clarification: There are tools and applications used for sending spams and emails in a huge number for flooding the recipient’s inbox with unwanted emails. Sendblaster, direct Sender, hotmailer are examples of bulk emailing tool.
11. Which of the following is not an anti-spam technique?
a) Signature-based content filtering
b) DNS routing
c) Bayesian Content Filtering
d) Collaborative content filtering
Answer: b
Clarification: Anti-spamming techniques help in reducing the spamming of unwanted messages and emails. Signature-based content filtering, Bayesian Content Filtering, and collaborative content filtering are examples of anti-spam technique.
12. Which of the following is not an anti-spam technique?
a) Reputation control
b) Sender policy framework
c) DNS-based block-list
d) Domain-based blocking
Answer: d
Clarification: The techniques used in dropping the spamming of unwanted messages and emails. Reputation control, sender policy framework, DNS-based block-list are some of the anti-spamming techniques.
13. ___________ is a tool used as spam filter in association with email programs and automatically intercepts spam emails.
a) Nessus
b) SpamExpert Desktop
c) Spam-Rescurer
d) Burp-Suite
Answer: b
Clarification: SpamExpert Desktop is a tool used as a spam filter in association with email programs and automatically intercepts spam emails. It is not keyword dependent for detecting spams; rather it checks the email content.
14. Which of the following is not an anti-spamming tool or system?
a) Spam-Eater Pro
b) SpyTech Spam Agent
c) SpamExperts Desktop
d) Anti-spyware Tech
Answer: d
Clarification: Some anti-spamming tools and systems that can be used for preventing your email from spamming are Spam-Eater Pro, SpyTech Spam Agent, SpamExperts Desktop etc.