Antispam and Antivirus MCQs

Antispam and Antivirus MCQs

Our team has conducted extensive research to compile a set of Antispam and Antivirus MCQs. We encourage you to test your Antispam and Antivirus knowledge by answering these 100+ multiple-choice questions provided below.
Simply scroll down to begin!

1: Where might a spammer get your personal information from?

A.   LinkedIn

B.   All of these

C.   MySpace

D.   Facebook

2: What is disposable email addressing?

A.   Someone who creates an email for the sole purpose of sending out spam

B.   Email addresses that are not rea, but they appear on the from section of an email. They are often used to help protect spammer's from being traced.

C.   A practice in which a spammer sends out mass emails from a single email account, but never logs into that account again.

D.   A practice in which you set a unique email address for sender/recipient communication. Disposable email addresses typically forward to one or more real email mailboxes where the owner can receive and read messages without revealing their true email.

3: What is rogue security software?

A.   Security software that is no longer being used for the purpose that was intended due to an exploit or hacker.

B.   Security software that has been compromised to not pick up certain threats

C.   Security software that considers data files or programs as viruses, when they are not.

D.   A fraudulent security program that appears to be helpful, but is actually not. It may deceive or mislead users into paying money to remove fake viruses or introduce malware after it is installed.

4: A virus is a program that attaches itself to (or replaces the contents of) which of the following file types?

A.   Source files

B.   Header files

C.   Executables

D.   Text files

5: What is a keylogger?

A.   Software that records keystrokes made on a keyboard

B.   Software used to log all attempts to access a certain file

C.   Software that steals passwords or "keys" that you have saved on your computer

D.   Software that that records keys you set when encrypting files

6: In order for antivirus programs to be most effective, it is necessary to keep which of the following up to date?

A.   File hashes

B.   Virus definition files

C.   Antivirus encryption keys

D.   Web browsers

7: If you cannot delete malware infected file, what is good method to try first?

A.   Boot in Windows safe mode and attempt to delete the file

B.   Reformat then attempt to delete the file

C.   Run Windows Restore

D.   Run Windows Repair

8: Automated spamming tools subscribe to mail lists in order to complete which of the following tasks?

A.   collect email addresses

B.   introduce security holes into the list

C.   deny service to mail list recipients

9: What run command can you use to check what programs load on startup?

A.   ipconfig

B.   cmd

C.   msconfig

D.   startup

10: What is a computer virus?

A.   Spyware that slows down a computer by sending statistics to an unknown source

B.   Software that steals files from your computer and is used by blackmailers

C.   A software that hijacks your computer and asks you to pay in order for it to be removed

D.   A type of malware that replicates itself and spreads to other files and/or computers.

11: Which of these is an example of a possible victim in a phishing attack?

A.   The website that was hacked

B.   The bank of the victim

C.   All of these

D.   The person who had their identity stolen

12: What is an example of a Phishing scam?

A.   Installing a virus and then asking you to pay to remove it

B.   An application that looks useful, but actually contains spyware to slow down your computer

C.   Hacking into a computer and leaving false trails on who did it

D.   An email that appears to be legitimate, but is really being used to obtain personal or important information

13: What could be a good indicator of a Spam email?

A.   An email that contains plenty of grammar mistakes

B.   Something that sounds too good to be true

C.   All of these

D.   An email sent to a bunch of random people

14: What is a good method for a website owner to confirm a user is not using an account for a spamming purposes?

A.   Requiring users provide valid personal information during sign up

B.   Users that register must click on a confirmation link to the email they specify in their profile

C.   All of these

D.   Users must associate a phone to their account and confirm a number sent to them via text

15: Malware is short for

A.   Maliant Software

B.   Malicious Systems

C.   Maliant Systems

D.   Malicious Software

16: Which of the following is not a well known anti-virus program?

A.   AVG

B.   SMAG

C.   AVAST

D.   McAFee

17: What are types of malware?

A.   Worms

B.   Viruses

C.   Spyware

D.   All of these

18: What is a captcha?

A.   It is a tool websites often use to prevent automated spammer bots from posting or registering on a website by forcing the user to do a task, often entering in letters or numbers based on a picture or audio, which verifies that they are human.

B.   A group of characters in hidden in an email that often includes code used in malware.

C.   A spam email that attempts to "capture" information and then use that information to cause damage; the second phase is often referred to as the "gotcha" phase.

D.   An SPAM email written in all caps

19: In order to infect a system, clicking an email attachment must cause which of the following conditions to occur?

A.   the attachment opens in a preview editor

B.   the attachment is decompressed

C.   the attachment executes

D.   the attachment is saved to the disk

20: How can you help stop spam?

A.   All of these

B.   Setup email filters based on keywords known to be in spam

C.   Unsubscribe from listservs

D.   Block certain email addresses known for sending spam

21: A virus can spread to another computer by

A.   Sharing an infected file with another computer

B.   Being on the same network as that computer

C.   Through touch

D.   Pinging other computers from the infected computer

A.   the click may validate the email address

B.   clicking the link will prevent

C.   unsubscribing makes finding the sender difficult

23: Which of these techniques would be effective in helping to prevent phishing attacks by scammers?

A.   Use Pop-ups

B.   Allow XSS

C.   Scan for and fix XSS issues

D.   Use IFRAME's

24: What is an example of a "419" Scam

A.   Someone who sends you an email in hopes you open an attachment which contains a virus

B.   A con in which someone asks you for assistance in retrieving a vast sum of money. Often it involves you helping him or her pay off certain fees and in return they promise to share the money with you.

C.   When you download a program that appears harmless, but it actually installs spyware on your computer

D.   Someone who uses social engineering to gain access to your computer or personal information

25: A client asks you to fix his computer because it has ransomware on it. He says he sees a message as soon as he loads windows, and cannot do anything else. What is the best way to fix this computer without losing any of his data?

A.   Reformat the computer

B.   Boot from a USB drive and run a program to remove the malware

C.   Use Windows Restore

D.   Reinstall Windows

26: What is an example of a captcha?

A.   What are the characters in this picture?

B.   1 + 1 = ?

C.   An interactive program which have instructions that read: "Move the triangle into the circle"

D.   All of these

27: Which of the following sites provide services for users to setup disposable emails?

A.   yahoo.com

B.   gmail.com

C.   hotmail.com

D.   jetable.org

28: What is the main difference between spyware and other malware?

A.   Spyware tends to steal or monitor data and/or personal information while malware encompasses all software that may been made with malicious intent in mind

B.   Spyware that slows down a computer by sending statistics to an unknown source, while malware only includes threats from inside your own computer

C.   There is no difference

D.   Malware monitors data usage, while spyware infects your computer with viruses

29: What is a botnet?

A.   A program that sends emails repeatedly infecting other computers who open it

B.   A collection of malware stored in a network

C.   A collection of computers working together to perform a single task. These computers are often penetrated by software containing malware.

D.   Software that automates networks

30: What is a backdoor?

A.   It is a way for spyware to leave a system without any trace of it being there

B.   A vulnerability in software that allows someone to bypass the normal authentication process

C.   It is a known bug or exploit hackers use to cause software to behave in a way that was not intended by the manufacturer

D.   It is where viruses store their source code and begin to replicate

31: Virus infection via email attachments can be minimized using which of the following?

A.   Right clicking attachments

B.   Deleting mail containing attachments from unknown senders

C.   Copying attachments to special directories before opening them

D.   Opening attachments from external hard drives

32: Which of the following spam filtering issues stops valid messages from being delivered?

A.   false negatives

B.   false positives

33: You have been told by several of your friends you have recently sent SPAM emails to them, what could be the cause of this and what should you do?

A.   A spammer has gained access to your email. Unfortunately, the only thing you can do to prevent further SPAM is to close your account and create a new email address.

B.   A spammer or bot may have gained access to your email account and sent out SPAM to all of your contacts. You should change your password immediately.

C.   A spammer is spoofing your email address. You should tell your friends to block the email address.

D.   A spammer may have infiltrated your email provider's host and compromised your account. You should notify your email provider.

34: What is ransomware?

A.   Software that steals files from your computer and is used by blackmailers

B.   A nickname for types of spyware that require a password on boot

C.   A software that hijacks your computer and asks you to pay in order for it to be removed

D.   Viruses that infect files and won't let you open them unless you know a certain pass code

35: Why are disposable email addresses useful?

A.   It is useful for people who do not want their emails to be read

B.   It is useful for spammers who want to send out a one time mass email, but never use that same email address again

C.   It is useful for someone who needs to give out their email or sign up to a website, but wants to protect their real email address from SPAM.

D.   It is useful for spammers to create false email addresses that does not exist in order to spoof the from email in their spam messsages.

36: Which is most likely something that could be considered strange account activity and may require further scrutiny on an e-commerce site?

A.   Orders from several user accounts are being sent to the same physical address

B.   A user logs in from another computer than the last login

C.   A user changes their more than once password

D.   A user changes their email

37: Which is not an example of an anti-spyware tool?

A.   Ad-Aware

B.   Kazaa

C.   Spybot

D.   Windows Defender

38: When a spammer forges the sender's address and enters an invalid receiver, which of the following settings will cause the receiving mail server to create backscatter?

A.   Drop messages

B.   Bounce messages

C.   Reject messages

39: Which of the following spam filtering techniques has the highest potential for generating false positives?

A.   Community Filtering

B.   Challenge-Response Filtering

C.   Bayesian Filtering

D.   Keyword Filtering

40: Which of the following techniques requires posting an email address where only spammers would find it?

A.   Blacklists

B.   Spam Traps

C.   Tarpits

41: What is CryptoLocker?

A.   A malware class which is known for encrypting itself to avoid detection.

B.   A type of encrypted Linux file system.

C.   A module of the Windows BitLocker encryption system.

D.   A type of ransomware which encrypts user files and demands payment for the decryption key.

42: Antivirus programs hash files on a computer in order to detect which of the following activities?

A.   File content changes

B.   File permissions changes

C.   File size changes

43: In order to help prevent spam, a honeypot performs which of the following functions?

A.   traps suspected spam messages

B.   delivers suspected spam messages more slowly

C.   acts as a desirable mail server in order to lure spammers

D.   routes suspected spam to special enclaves in the system

44: Which type of analysis is an antivirus program performing when it observes a file's activities in a sandbox or decompiles a file and analyzes its instructions?

A.   Performance Analysis

B.   Signature Analysis

C.   Heuristic Analysis

45: Performing outbound spam filtering does which of the following for an organization?

A.   helps prevent blacklisting

B.   helps prevent spam trapping

C.   helps prevent whitelisting

46: Which of the following tools would NOT be useful in figuring out what spyware or viruses could be installed on a client's computer?

A.   WireShark

B.   Malware Bytes

C.   HitmanPro

D.   HighjackThis

47: Which of the following reduces spam by rejecting mail from a specific ip addresses?

A.   IMAP Blacklisting

B.   DNS Blacklisting

C.   URL Blacklisting

D.   POP3 Blacklisting

48: What is email spoofing?

A.   Sending an email through multiple accounts in order to make it difficult to trace back the original email's sender address or origin

B.   When someone sends an email that appears to look like a legitimate, but it is actually not and is being used to obtain personal or important information.

C.   When someone forges or makes it appear that a email being sent is from a particular sender when it really is being sent by someone else.

D.   Copying or forwarding emails and then editing their To and From to make it appear that the email was originally sent to or from someone else

49: How can delivering mail as text instead of html help prevent spam?

A.   text is easier to analyze for spammer information

B.   text mail prevents web bugs from alerting spammer that the message was opened

C.   mail servers won't accept html messages if they are in text mode

50: Antivirus signatures are constructed using with of the following?

A.   Encryption Algorithms

B.   Cyclic Redundancy Checks

C.   Random Number Generators

D.   Hashes

51: Which of the following can prevent virus infections?

A.   Patching programs and the operating system

B.   Implementing a firewall

C.   Implementing an intrusion detection system

52: In a compromised system, which of the following provides the safest way to analyze it?

A.   Live CD/DVD

B.   Resident Antivirus Program

C.   Live USB

53: Which of the following is true of macro viruses?

A.   They depend on the operating system to propagate

B.   They depend on applications to propagate

C.   They are larger than traditional viruses

D.   They are written in low-level languages to avoid detection

54: Which of the following characteristics classify a mail message as spam?

A.   it is unsolicited and indiscriminately addressed

B.   it is unsolicited and contains advertising

C.   it is solicited and indiscriminately addressed

D.   it is solicited and contains advertising

A.   Yes, but only if it is an advertisement for a real product.

B.   No

C.   Yes because it is protected under the first amendment

D.   Yes, but only if it follows the standards listed in the CAN-SPAM Act of 2003

56: Firewalls help to prevent which of the following malware from propagating?

A.   Trojan viruses

B.   Polymorphic viruses

C.   Encrypted viruses

D.   Worms

57: Which of the following spam filtering techniques statistically analyzes mail?

A.   Community Filtering

B.   Bayesian Filtering

C.   Challenge-Response Filtering

D.   Keyword Filtering

58: On a WordPress site, which is the default service/tool to prevent spammers from posting comments?

A.   Website Inspector

B.   MailWasher Pro

C.   SpamAssassin

D.   Akismet

59: What is the difference between a worm and virus?

A.   Unlike a virus, a worm does not need to attach itself to a program to spread.

B.   A virus infects files, while a worm eats them

C.   A worm does not replicate itself like a virus does, but rather moves from computer to computer

D.   A worm is a virus created for a very specific purpose

60: Which of the following differentiates a virus from a worm?

A.   a virus can only infect a single machine

B.   a worm can infect multiple machines

C.   a virus requires user interaction to infect a machine

D.   a worm requires user interaction to infect a machine

61: Most spyware is used to...

A.   steal sensitive information on a computer in order to blackmail you

B.   slow down computers for the sole purpose of maliciousness

C.   track a user's movement on the web or display pop-up ads

D.   create a backdoor

62: Which of the following best describes a distributed antivirus tool that consist of a scanning client and a corresponding web service?

A.   Cloud Antivirus

B.   Internet OS Antivirus

C.   Web Antivirus

D.   Client/Server Antivirus

63: A virus can hide itself from an antivirus software by doing which of the following?

A.   replacing an executable file with its payload

B.   appending itself to an executable file

C.   compressing itself in a zip file

D.   intercepting operating system read and write requests

64: Which of the following is true of a trojan virus?

A.   a trojan reproduces by infecting other files

B.   a Trojan doesn't self-replicate

C.   a trojan inserts a copy of itself into another program

65: Polymorphic viruses randomly generate which of the following items before infecting a new file?

A.   mutation engine

B.   virus body

C.   decryption routine

66: Which of the following sites use disposable email addressing?

A.   All of these

B.   Craigslist

C.   Walmart

D.   Amazon

67: Which is not an example of a real life virus or worm discovered during the time period of 1980 to 2013?

A.   iRiot

B.   Elk Cloner

C.   The Michelangelo Virus

D.   The ILOVEYOU Worm

68: When using greylist filtering, a message will be considered legitimate if it does which of the following?

A.   sends its message more than once

B.   is not a multipart message

C.   sends its message without html markup

D.   contains a sender and subject line

69: In order to help prevent spam, a tarpit performs which of the following functions?

A.   delivers suspected spam messages more slowly

B.   acts as a desirable mail server in order to lure spammers

C.   routes suspected spam to special enclaves in the system

D.   traps suspected spam messages

70:

Which of the following are direct harms caused by spam?

A.   AES

B.   3-DES

C.   DES

D.   MD5

71: Which of the following actions can be taken while filtering SMTP spam traffic?

A.   Delete the spam mail

B.   Redirect it to the spam mail box

C.   Return it to the sender

D.   Tag the spam mail

72: Which of the following files are mostly infected?

A.   .DOT

B.   .EXE

C.   .COM

D.   .TXT

73: How many keys are required if two parties communicate using Symmetric Cryptography?

A.   One

B.   Two

C.   Three

D.   Four

74: What is S/MIME?

A.   Secure Multipurpose Intranet Mail Extensions

B.   Secure Multipurpose Internet Mail Extensions

C.   Secure Multipurpose Internet Message Extensions

D.   Secure Multipurpose Intranet Message Extensions

75: Which of the following antispam measures are taken to reduce spam?

A.   Legislative measures

B.   Organizational measures

C.   Behavioral measures

D.   Technological measures.

E.   All of the above

76: Which of the following are famous worm attacks?

A.   MyDoom Worm

B.   Bagle Worm

C.   Netsky Worm

D.   Sasser Worm

E.   All of the above

77: Which of the following techniques are used by spammers to find valid/existent email addresses?

A.   SMTP spoofing

B.   SMTP poisioning

C.   DNS poisioning

D.   Directory Harvest Attack

78: Which of the following techniques helps in cases of address forgery?

A.   SMTP extensions

B.   Cryptographic authentication

C.   Path authentication

D.   Hybrid authentication

79: Which of the following types of virus lives in the boot sector?

A.   Sector virus

B.   Parasitic virus

C.   Bootstrap sector

D.   Bootable virus

80: Which of the following is the Symmetric Algorithm used in cryptography?

A.   MD4

B.   El Gamal

C.   IDEA

D.   RSA

81: Suppose you got a mail from someone saying that you have won a $1 billion and asking you to give him/her $4000 to claim your prize. Under which category does this type of spam mail lie?

A.   Phishing and Fraud

B.   Spoofing mails

C.   Hoaxes

D.   Chain mails

82: What is botnet?

A.   A software that runs automatically and autonomously.

B.   A software used for antispam

C.   A software used to manage MTA

D.   A software used to manage MDA

83: To which of the following components does the MUA(Mail User Agent) forward the mail while sending it to another host in the e-mail flow?

A.   Mail User Agent

B.   Firewall

C.   Router

D.   Mail Transfer Agent

84: What is the maximum key length of AES?

A.   56

B.   156

C.   Variable

D.   256

85: Which of the following are disadvantages of the Symmetric Key Cryptography?

A.   Nonrepudiation

B.   Scalability

C.   Key distribution.

D.   Security

86: Which of the following are the ways through which virus spreads?

A.   Floppy Disk

B.   CD

C.   Email attachments

D.   Network connection

E.   All of the above

87: Which of the following are categories of spam mails?

A.   Phishing and Fraud

B.   Spoofing mails

C.   Hoaxes

D.   Chain mails

E.   All of the above

88: Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:

A.   Negative detection

B.   False positive

C.   False negative

D.   Untrue detection

89: Which of the following ports is used by IMAP?

A.   139

B.   137

C.   143

D.   142

E.   25

90: What are zombies?

A.   Antispam solutions.

B.   Remotely controlled hosts.

C.   Antivirus solutions

D.   Hackers

91: How many keys are required if two parties communicate using Asymmetric Cryptography?

A.   One

B.   Two

C.   Three

D.   Four

92: Which of the following programs establishes modem connection with pay-per-visit resources?

A.   Trojans

B.   Automatic dialers

C.   Worms

D.   Antivirus

93: Suppose you got a mail from the HSBC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?

A.   Phishing and fraud.

B.   Chain Mails.

C.   Hoaxes.

D.   Brand spoofing.

94: What is Phishing?

A.   Fraudulently acquiring sensitive information.

B.   An encryption technique

C.   An anti-spam technique

D.   A password building technique

95: Which of the following is the Hashing Algorithm?

A.   AES

B.   3-DES

C.   DES

D.   MD5

96: Which key is used to decrypt the message in PKI?

A.   Public Key.

B.   Private Key.

C.   Pre-shared Secret Key.

D.   Hybrid Key.

97: Which of the following are Email Security Protocols?

A.   S/MIME

B.   PEM

C.   STE

D.   PME

98: Which of the following symmetric algorithms have variable key length?

A.   AES

B.   Triple DES

C.   IDEA

D.   Rivest Cipher 4

99: What is Mail Exchanger(MX) Record?

A.   Router route.

B.   Record in router.

C.   Record in DNS specifying the internet email route.

D.   Record in DHCP specifying the email route.

100: Which of the following measures should be taken to tackle spam mails?

A.   Blocking and accepting on the basis of MTA IP address.

B.   Limiting the number of outgoing e-mails per account

C.   Authentication mechanisms

D.   Spam filtering.

E.   All of the above