Our team has conducted extensive research to compile a set of Antispam and Antivirus MCQs. We encourage you to test your Antispam and Antivirus knowledge by answering these 100+ multiple-choice questions provided below.
Simply scroll down to begin!
A. LinkedIn
B. All of these
C. MySpace
D. Facebook
A. Someone who creates an email for the sole purpose of sending out spam
B. Email addresses that are not rea, but they appear on the from section of an email. They are often used to help protect spammer's from being traced.
C. A practice in which a spammer sends out mass emails from a single email account, but never logs into that account again.
D. A practice in which you set a unique email address for sender/recipient communication. Disposable email addresses typically forward to one or more real email mailboxes where the owner can receive and read messages without revealing their true email.
A. Security software that is no longer being used for the purpose that was intended due to an exploit or hacker.
B. Security software that has been compromised to not pick up certain threats
C. Security software that considers data files or programs as viruses, when they are not.
D. A fraudulent security program that appears to be helpful, but is actually not. It may deceive or mislead users into paying money to remove fake viruses or introduce malware after it is installed.
A. Source files
B. Header files
C. Executables
D. Text files
A. Software that records keystrokes made on a keyboard
B. Software used to log all attempts to access a certain file
C. Software that steals passwords or "keys" that you have saved on your computer
D. Software that that records keys you set when encrypting files
A. File hashes
B. Virus definition files
C. Antivirus encryption keys
D. Web browsers
A. Boot in Windows safe mode and attempt to delete the file
B. Reformat then attempt to delete the file
C. Run Windows Restore
D. Run Windows Repair
A. collect email addresses
B. introduce security holes into the list
C. deny service to mail list recipients
A. ipconfig
B. cmd
C. msconfig
D. startup
A. Spyware that slows down a computer by sending statistics to an unknown source
B. Software that steals files from your computer and is used by blackmailers
C. A software that hijacks your computer and asks you to pay in order for it to be removed
D. A type of malware that replicates itself and spreads to other files and/or computers.
A. The website that was hacked
B. The bank of the victim
C. All of these
D. The person who had their identity stolen
A. Installing a virus and then asking you to pay to remove it
B. An application that looks useful, but actually contains spyware to slow down your computer
C. Hacking into a computer and leaving false trails on who did it
D. An email that appears to be legitimate, but is really being used to obtain personal or important information
A. An email that contains plenty of grammar mistakes
B. Something that sounds too good to be true
C. All of these
D. An email sent to a bunch of random people
A. Requiring users provide valid personal information during sign up
B. Users that register must click on a confirmation link to the email they specify in their profile
C. All of these
D. Users must associate a phone to their account and confirm a number sent to them via text
A. Maliant Software
B. Malicious Systems
C. Maliant Systems
D. Malicious Software
A. AVG
B. SMAG
C. AVAST
D. McAFee
A. Worms
B. Viruses
C. Spyware
D. All of these
A. It is a tool websites often use to prevent automated spammer bots from posting or registering on a website by forcing the user to do a task, often entering in letters or numbers based on a picture or audio, which verifies that they are human.
B. A group of characters in hidden in an email that often includes code used in malware.
C. A spam email that attempts to "capture" information and then use that information to cause damage; the second phase is often referred to as the "gotcha" phase.
D. An SPAM email written in all caps
A. the attachment opens in a preview editor
B. the attachment is decompressed
C. the attachment executes
D. the attachment is saved to the disk
A. All of these
B. Setup email filters based on keywords known to be in spam
C. Unsubscribe from listservs
D. Block certain email addresses known for sending spam
A. Sharing an infected file with another computer
B. Being on the same network as that computer
C. Through touch
D. Pinging other computers from the infected computer
A. the click may validate the email address
B. clicking the link will prevent
C. unsubscribing makes finding the sender difficult
A. Use Pop-ups
B. Allow XSS
C. Scan for and fix XSS issues
D. Use IFRAME's
A. Someone who sends you an email in hopes you open an attachment which contains a virus
B. A con in which someone asks you for assistance in retrieving a vast sum of money. Often it involves you helping him or her pay off certain fees and in return they promise to share the money with you.
C. When you download a program that appears harmless, but it actually installs spyware on your computer
D. Someone who uses social engineering to gain access to your computer or personal information
A. Reformat the computer
B. Boot from a USB drive and run a program to remove the malware
C. Use Windows Restore
D. Reinstall Windows
A. What are the characters in this picture?
B. 1 + 1 = ?
C. An interactive program which have instructions that read: "Move the triangle into the circle"
D. All of these
A. yahoo.com
B. gmail.com
C. hotmail.com
D. jetable.org
A. Spyware tends to steal or monitor data and/or personal information while malware encompasses all software that may been made with malicious intent in mind
B. Spyware that slows down a computer by sending statistics to an unknown source, while malware only includes threats from inside your own computer
C. There is no difference
D. Malware monitors data usage, while spyware infects your computer with viruses
A. A program that sends emails repeatedly infecting other computers who open it
B. A collection of malware stored in a network
C. A collection of computers working together to perform a single task. These computers are often penetrated by software containing malware.
D. Software that automates networks
A. It is a way for spyware to leave a system without any trace of it being there
B. A vulnerability in software that allows someone to bypass the normal authentication process
C. It is a known bug or exploit hackers use to cause software to behave in a way that was not intended by the manufacturer
D. It is where viruses store their source code and begin to replicate
A. Right clicking attachments
B. Deleting mail containing attachments from unknown senders
C. Copying attachments to special directories before opening them
D. Opening attachments from external hard drives
A. false negatives
B. false positives
A. A spammer has gained access to your email. Unfortunately, the only thing you can do to prevent further SPAM is to close your account and create a new email address.
B. A spammer or bot may have gained access to your email account and sent out SPAM to all of your contacts. You should change your password immediately.
C. A spammer is spoofing your email address. You should tell your friends to block the email address.
D. A spammer may have infiltrated your email provider's host and compromised your account. You should notify your email provider.
A. Software that steals files from your computer and is used by blackmailers
B. A nickname for types of spyware that require a password on boot
C. A software that hijacks your computer and asks you to pay in order for it to be removed
D. Viruses that infect files and won't let you open them unless you know a certain pass code
A. It is useful for people who do not want their emails to be read
B. It is useful for spammers who want to send out a one time mass email, but never use that same email address again
C. It is useful for someone who needs to give out their email or sign up to a website, but wants to protect their real email address from SPAM.
D. It is useful for spammers to create false email addresses that does not exist in order to spoof the from email in their spam messsages.
A. Orders from several user accounts are being sent to the same physical address
B. A user logs in from another computer than the last login
C. A user changes their more than once password
D. A user changes their email
A. Ad-Aware
B. Kazaa
C. Spybot
D. Windows Defender
A. Drop messages
B. Bounce messages
C. Reject messages
A. Community Filtering
B. Challenge-Response Filtering
C. Bayesian Filtering
D. Keyword Filtering
A. Blacklists
B. Spam Traps
C. Tarpits
A. A malware class which is known for encrypting itself to avoid detection.
B. A type of encrypted Linux file system.
C. A module of the Windows BitLocker encryption system.
D. A type of ransomware which encrypts user files and demands payment for the decryption key.
A. File content changes
B. File permissions changes
C. File size changes
A. traps suspected spam messages
B. delivers suspected spam messages more slowly
C. acts as a desirable mail server in order to lure spammers
D. routes suspected spam to special enclaves in the system
A. Performance Analysis
B. Signature Analysis
C. Heuristic Analysis
A. helps prevent blacklisting
B. helps prevent spam trapping
C. helps prevent whitelisting
A. WireShark
B. Malware Bytes
C. HitmanPro
D. HighjackThis
A. IMAP Blacklisting
B. DNS Blacklisting
C. URL Blacklisting
D. POP3 Blacklisting
A. Sending an email through multiple accounts in order to make it difficult to trace back the original email's sender address or origin
B. When someone sends an email that appears to look like a legitimate, but it is actually not and is being used to obtain personal or important information.
C. When someone forges or makes it appear that a email being sent is from a particular sender when it really is being sent by someone else.
D. Copying or forwarding emails and then editing their To and From to make it appear that the email was originally sent to or from someone else
A. text is easier to analyze for spammer information
B. text mail prevents web bugs from alerting spammer that the message was opened
C. mail servers won't accept html messages if they are in text mode
A. Encryption Algorithms
B. Cyclic Redundancy Checks
C. Random Number Generators
D. Hashes