Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
4 views21 pages

Unit V

The document outlines various questions related to web security, specifically focusing on SSL and TLS protocols, their functions, and associated concepts. It covers topics such as encryption types, certificate authorities, and the SET protocol for secure online transactions. Each question includes multiple-choice options with the correct answers provided for educational purposes.

Uploaded by

Dharshini Ram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views21 pages

Unit V

The document outlines various questions related to web security, specifically focusing on SSL and TLS protocols, their functions, and associated concepts. It covers topics such as encryption types, certificate authorities, and the SET protocol for secure online transactions. Each question includes multiple-choice options with the correct answers provided for educational purposes.

Uploaded by

Dharshini Ram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

UNIT V SECURITY FOR THE WEB AND SYSTEM SECURITY

Question1: START
Which layer of the OSI model does SSL operate at? (CO3)
Question1: END

Option_a: Network layer


Option_b: Transport layer
Option_c: Session layer
Option_d: Application layer
correct_option: Session layer

Question2: START
What is the primary function of SSL in online transactions? (CO3)
Question2: END

Option_a: Encrypting data transmission


Option_b: Speeding up website loading time
Option_c: Blocking malware
Option_d: Managing DNS queries
correct_option: Encrypting data transmission

Question3: START
Which cryptographic protocol was developed as the successor to SSL? (CO3)
Question3: END

Option_a: TLS
Option_b: IPSec
Option_c: HTTPS
Option_d: SSH
correct_option: TLS

Question4: START
What does an SSL certificate validate? (CO3)
Question4: END

Option_a: The authenticity of a website


Option_b: The internet speed of a user
Option_c: The IP address of a device
Option_d: The software version of a browser
correct_option: The authenticity of a website

Question5: START
What type of encryption does SSL use? (CO3)
Question5: END

Option_a: Symmetric encryption


Option_b: Asymmetric encryption
Option_c: Both symmetric and asymmetric encryption
Option_d: Hashing only
correct_option: Both symmetric and asymmetric encryption
Question6: START
Which port is commonly used for secure HTTP traffic with SSL? (CO3)
Question6: END

Option_a: 443
Option_b: 80
Option_c: 21
Option_d: 25
correct_option: 443

Question7: START
What is a common attack that SSL helps to prevent? (CO3)
Question7: END

Option_a: Man-in-the-middle attack


Option_b: DDoS attack
Option_c: SQL injection
Option_d: Phishing attack
correct_option: Man-in-the-middle attack

Question8: START
Which organization issues SSL certificates? (CO3)
Question8: END

Option_a: Certification Authority (CA)


Option_b: Internet Service Provider (ISP)
Option_c: Domain Registrar
Option_d: Web Hosting Provider
correct_option: Certification Authority (CA)

Question9: START
What is the key length commonly used in SSL encryption? (CO3)
Question9: END

Option_a: 64-bit
Option_b: 128-bit or 256-bit
Option_c: 512-bit
Option_d: 32-bit
correct_option: 128-bit or 256-bit

Question10: START
What does HTTPS stand for? (CO3)
Question10: END

Option_a: HyperText Transfer Protocol Secure


Option_b: HyperTransfer Text Protocol Secure
Option_c: HyperThread Transfer Protocol Secure
Option_d: HighText Transfer Protocol Secure
correct_option: HyperText Transfer Protocol Secure
Question11: START
Which cryptographic protocol was introduced to replace SSL? (CO3)
Question11: END

Option_a: IPSec
Option_b: HTTPS
Option_c: TLS
Option_d: SSH
correct_option: TLS

Question12: START
What is the primary function of TLS? (CO3)
Question12: END

Option_a: Secure online transactions and communications


Option_b: Enhance web page loading speed
Option_c: Block pop-up advertisements
Option_d: Optimize search engine ranking
correct_option: Secure online transactions and communications

Question13: START
Which version of TLS is considered the most secure as of recent updates? (CO3)
Question13: END

Option_a: TLS 1.0


Option_b: TLS 1.1
Option_c: TLS 1.2
Option_d: TLS 1.3
correct_option: TLS 1.3

Question14: START
Which of the following is NOT a feature of TLS? (CO3)
Question14: END

Option_a: Encryption
Option_b: Authentication
Option_c: Compression
Option_d: Data Integrity
correct_option: Compression

Question15: START
What type of encryption does TLS use? (CO3)
Question15: END

Option_a: Symmetric encryption only


Option_b: Asymmetric encryption only
Option_c: Both symmetric and asymmetric encryption
Option_d: Hashing only
correct_option: Both symmetric and asymmetric encryption
Question16: START
Which of the following protocols uses TLS to secure email communication? (CO3)
Question16: END

Option_a: SMTP
Option_b: FTP
Option_c: HTTP
Option_d: Telnet
correct_option: SMTP

Question17: START
Which port is commonly used for secure HTTP traffic using TLS? (CO3)
Question17: END

Option_a: 443
Option_b: 80
Option_c: 21
Option_d: 22
correct_option: 443

Question18: START
Which attack does TLS help to prevent? (CO3)
Question18: END

Option_a: Man-in-the-middle attack


Option_b: DDoS attack
Option_c: SQL injection
Option_d: Phishing attack
correct_option: Man-in-the-middle attack

Question19: START
Which layer of the OSI model does TLS operate at? (CO3)
Question19: END

Option_a: Network layer


Option_b: Transport layer
Option_c: Session layer
Option_d: Application layer
correct_option: Transport layer

Question20: START
What is the role of the handshake protocol in TLS? (CO3)
Question20: END

Option_a: Establishes a secure session between client and server


Option_b: Encrypts the entire data stream
Option_c: Verifies firewall configurations
Option_d: Speeds up data transmission
correct_option: Establishes a secure session between client and server
Question21: START
What is the primary purpose of the Record Protocol in TLS? (CO3)
Question21: END

Option_a: To ensure message confidentiality and integrity


Option_b: To authenticate users
Option_c: To manage IP addresses
Option_d: To encrypt passwords only
correct_option: To ensure message confidentiality and integrity

Question22: START
Which protocol is often used with TLS to secure email communications? (CO3)
Question22: END

Option_a: SMTP
Option_b: POP3
Option_c: IMAP
Option_d: All of the above
correct_option: All of the above

Question23: START
Which of the following is a key component of the TLS handshake process? (CO3)
Question23: END

Option_a: Cipher suite negotiation


Option_b: Web page caching
Option_c: Email verification
Option_d: Network address translation
correct_option: Cipher suite negotiation

Question24: START
What does Perfect Forward Secrecy (PFS) in TLS ensure? (CO3)
Question24: END

Option_a: Past communications remain secure even if a private key is compromised


Option_b: Faster encryption speeds
Option_c: Reduced need for authentication
Option_d: Lower bandwidth consumption
correct_option: Past communications remain secure even if a private key is compromised

Question25: START
Which type of malware allows remote access to a victim’s computer? (CO4)
Question25: END

Option_a: Adware
Option_b: Remote Access Trojan (RAT)
Option_c: Keylogger
Option_d: Worm
correct_option: Remote Access Trojan (RAT)
Question26: START
Which encryption algorithm is commonly used in TLS for symmetric encryption? (CO3)
Question26: END

Option_a: AES
Option_b: RSA
Option_c: MD5
Option_d: SHA-1
correct_option: AES

Question27: START
How does TLS ensure data integrity? (CO3)
Question27: END

Option_a: By using Message Authentication Codes (MACs)


Option_b: By compressing data before transmission
Option_c: By preventing all network attacks
Option_d: By using IP-based authentication
correct_option: By using Message Authentication Codes (MACs)

Question28: START
Which type of attack can be mitigated using TLS? (CO3)
Question28: END

Option_a: Eavesdropping
Option_b: Phishing
Option_c: Brute force
Option_d: Ransomware
correct_option: Eavesdropping

Question29: START
Which of the following statements about TLS certificates is true? (CO3)
Question29: END

Option_a: TLS certificates authenticate a server's identity


Option_b: TLS certificates encrypt all network traffic
Option_c: TLS certificates replace firewalls
Option_d: TLS certificates block viruses
correct_option: TLS certificates authenticate a server's identity

Question30: START
What does OCSP stand for in the context of TLS? (CO3)
Question30: END

Option_a: Online Certificate Status Protocol


Option_b: Open Cipher Security Protocol
Option_c: Official Cyber Security Policy
Option_d: Optimized Cryptographic Secure Processing
correct_option: Online Certificate Status Protocol
Question31: START
What is the role of a Certification Authority (CA) in TLS? (CO3)
Question31: END

Option_a: Issuing digital certificates to verify authenticity


Option_b: Managing encryption keys
Option_c: Blocking malicious websites
Option_d: Encrypting browser cookies
correct_option: Issuing digital certificates to verify authenticity

Question32: START
What is the primary purpose of the Secure Electronic Transaction (SET) protocol?
Question32: END

Option_a: To ensure secure online transactions


Option_b: To replace SSL/TLS for all internet communications
Option_c: To provide anonymous transactions
Option_d: To encrypt emails only
correct_option: To ensure secure online transactions

Question33: START
Which two companies originally developed the SET protocol?
Question33: END

Option_a: Microsoft and Google


Option_b: Visa and MasterCard
Option_c: IBM and PayPal
Option_d: Apple and Amazon
correct_option: Visa and MasterCard

Question34: START
Which cryptographic technique does SET primarily use for securing transactions?
Question34: END

Option_a: Symmetric encryption only


Option_b: Asymmetric encryption only
Option_c: A combination of symmetric and asymmetric encryption
Option_d: Hashing only
correct_option: A combination of symmetric and asymmetric encryption

Question35: START
Which of the following is NOT a key component of the SET protocol?
Question35: END

Option_a: Cardholder
Option_b: Merchant
Option_c: Acquirer
Option_d: Internet Service Provider
correct_option: Internet Service Provider

Question36: START
What is the purpose of the dual signature in the SET protocol?
Question36: END

Option_a: To provide authentication and integrity


Option_b: To ensure both buyer and seller sign the transaction
Option_c: To link payment information and order information securely
Option_d: To replace digital certificates
correct_option: To link payment information and order information securely

Question37: START
In SET, who issues the digital certificates for authentication?
Question37: END

Option_a: Certificate Authority (CA)


Option_b: The Merchant
Option_c: The Acquirer
Option_d: The Cardholder
correct_option: Certificate Authority (CA)

Question38: START
Which encryption algorithm is commonly used in SET for secure communication?
Question38: END

Option_a: AES
Option_b: DES
Option_c: RSA
Option_d: MD5
correct_option: RSA

Question39: START
What is the role of the Payment Gateway in SET?
Question39: END

Option_a: To process the payment authorization


Option_b: To store credit card information
Option_c: To verify the customer’s email
Option_d: To generate a digital certificate
correct_option: To process the payment authorization
Question40: START
Which key does the cardholder use to encrypt the order information in SET?
Question40: END

Option_a: Merchant’s public key


Option_b: Acquirer’s public key
Option_c: Their own private key
Option_d: Their own public key
correct_option: Merchant’s public key

Question41: START
Which of the following is NOT a phase in the SET protocol?
Question41: END

Option_a: Cardholder registration


Option_b: Payment authorization
Option_c: Shipping verification
Option_d: Purchase request
correct_option: Shipping verification

Question42: START
What does SET use to verify the authenticity of transaction participants?
Question42: END

Option_a: OTP authentication


Option_b: Biometric authentication
Option_c: Digital certificates
Option_d: Static passwords
correct_option: Digital certificates

Question43: START
What is the main disadvantage of the SET protocol?
Question43: END

Option_a: High computational overhead


Option_b: Weak encryption methods
Option_c: Lack of merchant verification
Option_d: No support for online banking
correct_option: High computational overhead

Question44: START
Which organization plays the role of a trusted third party in SET?
Question44: END

Option_a: The Merchant


Option_b: The Cardholder
Option_c: Certificate Authority (CA)
Option_d: The Acquirer
correct_option: Certificate Authority (CA)

Question45: START
What type of certificate is issued to merchants in SET?
Question45: END

Option_a: Root certificate


Option_b: Payment Gateway certificate
Option_c: Merchant certificate
Option_d: Acquirer certificate
correct_option: Merchant certificate

Question46: START
What does the acronym PAN stand for in the SET protocol?
Question46: END

Option_a: Personal Account Number


Option_b: Payment Authorization Number
Option_c: Public Authentication Network
Option_d: Private Access Node
correct_option: Personal Account Number

Question47: START
What does SET primarily aim to protect during an online transaction?
Question47: END

Option_a: Customer’s name and address


Option_b: Only the merchant’s information
Option_c: Cardholder’s payment details
Option_d: Internet speed and performance
correct_option: Cardholder’s payment details

Question48: START
Which of the following is NOT a characteristic of SET?
Question48: END

Option_a: Confidentiality
Option_b: Integrity
Option_c: Anonymity
Option_d: Authentication
correct_option: Anonymity
Question49: START
How does SET ensure that merchants cannot see the cardholder’s payment information?
Question49: END

Option_a: By encrypting the order using the acquirer’s public key


Option_b: By using a dual signature to separate order and payment details
Option_c: By sending the credit card details directly to the merchant
Option_d: By requiring a PIN code from the cardholder
correct_option: By using a dual signature to separate order and payment details

Question50: START
Which of the following best describes a dual signature in SET?
Question50: END

Option_a: A single signature used twice


Option_b: A combination of two separate private keys
Option_c: A signature that links order and payment information securely
Option_d: A method of encrypting the payment details
correct_option: A signature that links order and payment information securely

Question51: START
Which key does the cardholder use to create the dual signature in SET?
Question51: END

Option_a: The merchant’s public key


Option_b: The acquirer’s private key
Option_c: The cardholder’s private key
Option_d: The certificate authority’s private key
correct_option: The cardholder’s private key

Question52: START
What role does the acquirer play in the SET protocol?
Question52: END

Option_a: Issues digital certificates to merchants


Option_b: Processes and verifies payments from cardholders
Option_c: Provides internet access for secure transactions
Option_d: Stores customer order details
correct_option: Processes and verifies payments from cardholders

Question53: START
In SET, what is the primary function of the Payment Gateway?
Question53: END
Option_a: Encrypts customer data
Option_b: Authenticates both the cardholder and merchant
Option_c: Acts as an intermediary between the merchant and acquirer
Option_d: Stores payment information
correct_option: Acts as an intermediary between the merchant and acquirer

Question54: START
Why was the SET protocol not widely adopted for online transactions?
Question54: END

Option_a: It was too slow for real-time transactions


Option_b: It required complex infrastructure and was costly
Option_c: It was less secure than SSL
Option_d: It lacked support for credit card payments
correct_option: It required complex infrastructure and was costly

Question55: START
Which of the following protocols eventually became more widely used than SET?
Question55: END

Option_a: Secure Shell (SSH)


Option_b: Secure Sockets Layer (SSL)
Option_c: File Transfer Protocol (FTP)
Option_d: Hypertext Transfer Protocol (HTTP)
correct_option: Secure Sockets Layer (SSL)

Question56: START
What is the function of hash functions in the SET protocol?
Question56: END

Option_a: To encrypt credit card numbers


Option_b: To verify data integrity
Option_c: To generate encryption keys
Option_d: To store digital certificates
correct_option: To verify data integrity

Question57: START
Which component in SET verifies the merchant’s legitimacy?
Question57: END

Option_a: The cardholder


Option_b: The acquirer
Option_c: The payment gateway
Option_d: The certificate authority
correct_option: The certificate authority
Question58: START
What type of key is included in a digital certificate issued to a cardholder in SET?
Question58: END

Option_a: Private key


Option_b: Public key
Option_c: Session key
Option_d: Symmetric key
correct_option: Public key

Question59: START
Which of the following is a limitation of SET compared to SSL?
Question59: END

Option_a: SET does not support encryption


Option_b: SET requires more computational resources
Option_c: SET does not use digital signatures
Option_d: SET is less secure than SSL
correct_option: SET requires more computational resources

Question60: START
What does the merchant send to the acquirer in the payment authorization phase of SET?
Question60: END

Option_a: The cardholder’s private key


Option_b: The encrypted order details and transaction details
Option_c: The dual signature of the acquirer
Option_d: The certificate authority’s public key
correct_option: The encrypted order details and transaction details

Question61: START
Which of the following does SET use to protect against replay attacks?
Question61: END

Option_a: Nonce values


Option_b: Password authentication
Option_c: Symmetric encryption
Option_d: Time delay mechanisms
correct_option: Nonce values
Question62: START
Which of the following is an example of a worm? (CO1)
Question62: END

Option_a: Melissa
Option_b: Stuxnet
Option_c: Trojan.Downloader
Option_d: Zeus
correct_option: Stuxnet

Question63: START
What does a rootkit primarily do? (CO1)
Question63: END

Option_a: Encrypt files for ransom


Option_b: Hide the presence of malicious software
Option_c: Spread across networks without user intervention
Option_d: Slow down computer processing
correct_option: Hide the presence of malicious software

Question64: START
What type of malware records a user's keystrokes to steal sensitive data? (CO1)
Question64: END

Option_a: Worm
Option_b: Keylogger
Option_c: Ransomware
Option_d: Adware
correct_option: Keylogger

Question65: START
Which of the following is NOT a characteristic of a computer worm? (CO1)
Question65: END

Option_a: Self-replicating
Option_b: Requires a host file
Option_c: Can spread through networks
Option_d: Can exploit vulnerabilities
correct_option: Requires a host file

Question66: START
What is the primary goal of ransomware? (CO1)
Question66: END

Option_a: Spy on user activities


Option_b: Encrypt data and demand payment
Option_c: Overload network traffic
Option_d: Redirect users to malicious websites
correct_option: Encrypt data and demand payment
Question67: START
Which firewall type is best suited for filtering traffic at the transport layer? (CO2)
Question67: END

Option_a: Packet filtering firewall


Option_b: Circuit-level gateway
Option_c: Application firewall
Option_d: Host-based firewall
correct_option: Circuit-level gateway

Question68: START
A proxy firewall works by: (CO2)
Question68: END

Option_a: Blocking all outgoing traffic


Option_b: Intercepting requests and forwarding them on behalf of users
Option_c: Encrypting all network traffic
Option_d: Preventing DoS attacks
correct_option: Intercepting requests and forwarding them on behalf of users

Question69: START
Which firewall configuration method is considered the most secure? (CO2)
Question69: END

Option_a: Allow all traffic, deny specific addresses


Option_b: Deny all traffic, allow specific addresses
Option_c: Allow and deny based on user behavior
Option_d: Only monitor but do not block traffic
correct_option: Deny all traffic, allow specific addresses

Question70: START
What is a major disadvantage of a packet-filtering firewall? (CO2)
Question70: END

Option_a: It cannot filter based on application data


Option_b: It slows down network traffic significantly
Option_c: It is expensive to implement
Option_d: It requires constant updates
correct_option: It cannot filter based on application data

Question71: START
Which firewall type integrates deep packet inspection, application control, and intrusion prevention?
(CO2)
Question71: END

Option_a: Proxy firewall


Option_b: Stateful firewall
Option_c: Next-generation firewall
Option_d: Circuit-level firewall
correct_option: Next-generation firewall
Question72: START
What is the main function of a Network-Based IDS (NIDS)? (CO3)
Question72: END

Option_a: Protecting local files


Option_b: Monitoring network traffic for suspicious activities
Option_c: Encrypting communications
Option_d: Preventing unauthorized physical access
correct_option: Monitoring network traffic for suspicious activities

Question73: START
Which of the following is a benefit of an IPS over an IDS? (CO3)
Question73: END

Option_a: IPS actively blocks threats


Option_b: IPS does not require monitoring
Option_c: IPS cannot be bypassed
Option_d: IPS is less expensive than IDS
correct_option: IPS actively blocks threats

Question74: START
Which of the following is an example of an intrusion detection technique? (CO3)
Question74: END

Option_a: Signature-based detection


Option_b: Phishing attack
Option_c: DNS spoofing
Option_d: Network congestion
correct_option: Signature-based detection

Question75: START
Which IDS/IPS detection method relies on a database of known attack patterns? (CO3)
Question75: END

Option_a: Anomaly-based detection


Option_b: Signature-based detection
Option_c: Heuristic detection
Option_d: Statistical detection
correct_option: Signature-based detection

Question76: START
Which security measure is commonly paired with IDS for enhanced threat response? (CO3)
Question76: END

Option_a: VPN
Option_b: Firewall
Option_c: Cloud backup
Option_d: Email filtering
correct_option: Firewall
Question77: START
What is the primary purpose of a honeypot in cybersecurity? (CO4)
Question77: END

Option_a: To detect and analyze attacks


Option_b: To prevent unauthorized access
Option_c: To block network traffic
Option_d: To filter spam emails
correct_option: To detect and analyze attacks

Question78: START
A zero-day vulnerability is: (CO4)
Question78: END

Option_a: A security flaw discovered after a patch is released


Option_b: An unknown security flaw with no available fix
Option_c: A vulnerability in an expired software license
Option_d: A security setting in operating systems
correct_option: An unknown security flaw with no available fix

Question79: START
Which of the following is NOT a common cyber attack? (CO4)
Question79: END

Option_a: Phishing
Option_b: Man-in-the-middle
Option_c: Network balancing
Option_d: SQL Injection
correct_option: Network balancing

Question80: START
What is the primary goal of penetration testing? (CO4)
Question80: END

Option_a: To recover lost data


Option_b: To find and exploit security weaknesses
Option_c: To detect hardware failures
Option_d: To improve system speed
correct_option: To find and exploit security weaknesses

Question81: START
A botnet is typically used for: (CO4)
Question81: END

Option_a: Running software updates


Option_b: Coordinating large-scale cyber attacks
Option_c: Preventing malware infections
Option_d: Monitoring network traffic
correct_option: Coordinating large-scale cyber attacks
Question82: START
What does Multi-Factor Authentication (MFA) add to user security? (CO4)
Question82: END

Option_a: A secondary method of authentication


Option_b: Faster login times
Option_c: Automatic password reset
Option_d: Stronger encryption
correct_option: A secondary method of authentication

Question83: START
Which term describes an attack where traffic is secretly intercepted and modified? (CO4)
Question83: END

Option_a: Phishing
Option_b: Denial of Service
Option_c: Man-in-the-middle
Option_d: Ransomware
correct_option: Man-in-the-middle

Question84: START
Which security principle ensures data remains unaltered during transmission? (CO4)
Question84: END

Option_a: Confidentiality
Option_b: Integrity
Option_c: Availability
Option_d: Redundancy
correct_option: Integrity

Question85: START
Which protocol is commonly used to secure web traffic? (CO4)
Question85: END

Option_a: FTP
Option_b: HTTP
Option_c: HTTPS
Option_d: Telnet
correct_option: HTTPS

Question86: START
Which of the following is a primary function of S/MIME in email security? (CO1)
Question86: END
Option_a: Encrypting and digitally signing emails
Option_b: Blocking spam emails
Option_c: Filtering phishing emails
Option_d: Detecting malware attachments
correct_option: Encrypting and digitally signing emails
Question87: START
Which encryption algorithm is commonly used in S/MIME for securing emails? (CO2)
Question87: END
Option_a: AES
Option_b: RSA
Option_c: SHA-256
Option_d: MD5
correct_option: RSA

Question88: START
What is the main purpose of an S/MIME digital signature? (CO1)
Question88: END
Option_a: To encrypt the email content
Option_b: To verify the sender’s identity and email integrity
Option_c: To prevent spam emails
Option_d: To filter unwanted advertisements
correct_option: To verify the sender’s identity and email integrity

Question89: START
Which of the following is NOT a common email spam detection technique? (CO3)
Question89: END
Option_a: Blacklist filtering
Option_b: Heuristic analysis
Option_c: Public key infrastructure (PKI)
Option_d: Bayesian filtering
correct_option: Public key infrastructure (PKI)

Question90: START
What role does the Certificate Authority (CA) play in S/MIME? (CO2)
Question90: END
Option_a: It encrypts all outgoing emails
Option_b: It verifies and issues digital certificates
Option_c: It scans emails for spam
Option_d: It prevents phishing attacks
correct_option: It verifies and issues digital certificates

Question91: START
Which of the following is NOT a component of an S/MIME email? (CO2)
Question91: END
Option_a: Digital certificate
Option_b: Digital signature
Option_c: Email header
Option_d: Biometric authentication
correct_option: Biometric authentication
Question92: START
Which type of attack does S/MIME help mitigate? (CO4)
Question92: END
Option_a: Phishing
Option_b: Man-in-the-middle
Option_c: Spoofing
Option_d: All of the above
correct_option: All of the above

Question93: START
What does Bayesian filtering analyze in email spam detection? (CO3)
Question93: END
Option_a: Email metadata
Option_b: Email subject and content probabilities
Option_c: The sender’s IP address
Option_d: The presence of digital signatures
correct_option: Email subject and content probabilities

Question94: START
Which of the following is NOT a method used for email spam filtering? (CO3)
Question94: END
Option_a: Greylisting
Option_b: Hashing algorithms
Option_c: Content-based filtering
Option_d: Blacklist-based filtering
correct_option: Hashing algorithms

Question95: START
Which port is commonly used for sending S/MIME encrypted emails using SMTP with TLS? (CO2)
Question95: END
Option_a: 110
Option_b: 143
Option_c: 587
Option_d: 25
correct_option: 587

Question96: START
Which of the following is a disadvantage of S/MIME? (CO4)
Question96: END
Option_a: It enhances email security
Option_b: It ensures email integrity
Option_c: It requires certificate management
Option_d: It prevents spam emails
correct_option: It requires certificate management

Question97: START
How does S/MIME protect email confidentiality? (CO2)
Question97: END
Option_a: By encrypting email content
Option_b: By using machine learning algorithms
Option_c: By detecting spam emails
Option_d: By analyzing email metadata
correct_option: By encrypting email content

Question98: START
What does DKIM stand for in email security? (CO3)
Question98: END
Option_a: Domain Key Infrastructure Management
Option_b: Domain Keys Identified Mail
Option_c: Digital Key Identified Mail
Option_d: Distributed Key Integrity Mechanism
correct_option: Domain Keys Identified Mail

Question99: START
Which of the following email authentication techniques works with S/MIME? (CO2)
Question99: END
Option_a: SPF
Option_b: DKIM
Option_c: DMARC
Option_d: All of the above
correct_option: All of the above

Question100: START
What is the primary advantage of using S/MIME over PGP for email encryption? (CO4)
Question100: END
Option_a: S/MIME uses symmetric encryption only
Option_b: S/MIME relies on a trusted Certificate Authority (CA)
Option_c: S/MIME does not require digital certificates
Option_d: S/MIME is completely spam-proof
correct_option: S/MIME relies on a trusted Certificate Authority (CA)

You might also like