Cyber Security Questions and Answers for Entrance exams on “Email Security”.
1. Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)?
a) Zeus
b) Stuxnet
c) Reaper Exploit
d) Friday the 13
Answer: c
Clarification: Reaper exploit is a micro-virus that can compromise the email security as it works in the background and sends a copy of reply or forwarded the email to its creator or sender.
2. Email users who use IE as their _________________ are vulnerable to Reaper Exploit.
a) Web engine
b) Rendering engine
c) Game engine
d) HTML engine
Answer: d
Clarification: Email users who use Internet Explorer as their HTML engine are vulnerable to Reaper Exploit. It works in the background and sends a copy of a reply or forwarded the email to its creator or sender.
3. _______________ needs to be turned off in order to prevent from this attack.
a) Email scripting
b) Email attachments
c) Email services
d) Third party email programs
Answer: a
Clarification: Email users who use Internet Explorer as their HTML engine are vulnerable to Reaper Exploit. It works in the background and sends a copy of a reply or forwarded the email to its creator or sender. Email scripting needs to be turned off in order to prevent from this attack.
4. Which of the following is a tool to monitor outgoing traffic of target PC’s email and intercept all the emails sent from it?
a) Wireshark
b) Advanced Stealth Email Redirector
c) MS Outlook
d) Cisco Jabber
Answer: b
Clarification: Advanced Stealth Email Redirector is a tool to monitor outgoing traffic of target PC’s email and intercept all the emails send from it. Intercepted emails are then forwarded to a pre-specified email ID.
5. Advanced SER is abbreviated as ___________
a) Advanced Stealth Electronic Redirector
b) Advanced Security Email Redirector
c) Advanced Stealth Email Redirector
d) Advanced Stealth Email Recorder
Answer: c
Clarification: Advanced Stealth Email Redirector (Advanced SER) is a tool to monitor outgoing traffic of target PC’s email and intercept all the emails send from it. Intercepted emails are then forwarded to a pre-specified email ID.
6. Which of the following will not help in preserving email security?
a) Create a strong password
b) Connect your email to a phone number
c) Use two-factor authentication for password verification and login
d) Click on unknown links and sites
Answer: d
Clarification: Some of the following measures to preserve your email security is via creating a strong password, connecting your emails to your personal phone number and set up 2-factor authentication for login.
7. Once the email is compromised, all other sites and services online associated with this email can be compromised.
a) True
b) False
Answer: a
Clarification: Email security is very much necessary because once the email is compromised, all other sites and services online associated with this email can be compromised and the hacker will be able to access all other accounts linked to this email.
8. _____________ is an encryption program or add-ons which provides cryptographic privacy & authentication for email communication.
a) Powerful Good Privacy
b) Pretty Good Privacy
c) Pretty Good Encryption
d) Pretty Strong Encryption
Answer: b
Clarification: Pretty Good Privacy is an encryption program which provides cryptographic privacy & authentication for email communication. Basically, it is used for securing user’s texts, emails, attachments etc.
9. PGP is abbreviated as _______________
a) Pretty Good Privacy
b) Powerful Good Privacy
c) Protocol Giving Privacy
d) Pretty Good Protocol
Answer: a
Clarification: Pretty Good Privacy (PGP) is an encryption program which provides cryptographic privacy & authentication for email communication. Basically, it is used for securing user’s texts, emails, attachments etc.
10. Which of them is not an example of business email security tool?
a) Microsoft Office Trust Center
b) Sendinc
c) Hushmail Business
d) Cisco Jabber
Answer: d
Clarification: Cisco Jabber is a unified communications application that lets users access, send instant messaging, voice, voice messaging, desktop sharing, & conferencing. The rest three are a business email security tools.
11. Which of them is not an example of business email security tool?
a) Enlocked
b) RPost Office
c) MS Outlook
d) Sendinc
Answer: c
Clarification: MS Outlook is a web-based desktop app as well as an online suite of webmail, tasks, contacts & calendaring services developed by Microsoft. The rest three are a business email security tools.
12. ________________ is a free extension of browser that enables you in decrypting as well as encrypting emails.
a) Enlocked
b) MS Outlook
c) Cisco Jabber
d) Mailvelope
Answer: d
Clarification: Mailvelope is a free extension of the browser (which is available for both Google Chrome as well as Mozilla Firefox) that enables users in decrypting as well as encrypting emails using an openPGP standard of encryption.
13. Which of the following is not an email related hacking tool?
a) Email Finder Pro
b) Sendinc
c) Mail PassView
d) Mail Password
Answer: b
Clarification: Sendinc is not an email data compromising tool. It is used for securing business email accounts and offers a quick web-based way to jump into offering secure emails for firms. The rest three are email compromising tools.
14. _______________ is targeted bulk email marketing software.
a) Email Spider Toolkit
b) Email Spider Easy
c) Email Crawler Easy
d) Email Spider Toolkit
Answer: b
Clarification: Email Spider Easy is targeted bulk email marketing software. It rapidly & automatically searches & spider from the search engine for finding email addresses. This tool is integrated with top search engines.
15. ______________ is a tool that is integrated with top 90 search engines to grab quick search for email addresses and other details.
a) Email Spider Toolkit
b) Email Spider Easy
c) Email Crawler Easy
d) Email Spider Toolkit
Answer: b
Clarification: Email Spider Easy is targeted bulk email marketing software. It rapidly & automatically searches & spider from the search engine for finding email addresses. This tool is integrated with top search engines & its speed allows up to 500 email extraction threads simultaneously.
16. MegaHackerZ helps crackers to crack email passwords.
a) True
b) False
Answer: a
Clarification: MegaHackerZ helps crackers to crack email passwords. Though it is not used very much as the versions are deprecated. But it is still useful for weak passwords to crack easily.