UNIT V SECURITY FOR THE WEB AND SYSTEM SECURITY
Question1: START
Which layer of the OSI model does SSL operate at? (CO3)
Question1: END
Option_a: Network layer
Option_b: Transport layer
Option_c: Session layer
Option_d: Application layer
correct_option: Session layer
Question2: START
What is the primary function of SSL in online transactions? (CO3)
Question2: END
Option_a: Encrypting data transmission
Option_b: Speeding up website loading time
Option_c: Blocking malware
Option_d: Managing DNS queries
correct_option: Encrypting data transmission
Question3: START
Which cryptographic protocol was developed as the successor to SSL? (CO3)
Question3: END
Option_a: TLS
Option_b: IPSec
Option_c: HTTPS
Option_d: SSH
correct_option: TLS
Question4: START
What does an SSL certificate validate? (CO3)
Question4: END
Option_a: The authenticity of a website
Option_b: The internet speed of a user
Option_c: The IP address of a device
Option_d: The software version of a browser
correct_option: The authenticity of a website
Question5: START
What type of encryption does SSL use? (CO3)
Question5: END
Option_a: Symmetric encryption
Option_b: Asymmetric encryption
Option_c: Both symmetric and asymmetric encryption
Option_d: Hashing only
correct_option: Both symmetric and asymmetric encryption
Question6: START
Which port is commonly used for secure HTTP traffic with SSL? (CO3)
Question6: END
Option_a: 443
Option_b: 80
Option_c: 21
Option_d: 25
correct_option: 443
Question7: START
What is a common attack that SSL helps to prevent? (CO3)
Question7: END
Option_a: Man-in-the-middle attack
Option_b: DDoS attack
Option_c: SQL injection
Option_d: Phishing attack
correct_option: Man-in-the-middle attack
Question8: START
Which organization issues SSL certificates? (CO3)
Question8: END
Option_a: Certification Authority (CA)
Option_b: Internet Service Provider (ISP)
Option_c: Domain Registrar
Option_d: Web Hosting Provider
correct_option: Certification Authority (CA)
Question9: START
What is the key length commonly used in SSL encryption? (CO3)
Question9: END
Option_a: 64-bit
Option_b: 128-bit or 256-bit
Option_c: 512-bit
Option_d: 32-bit
correct_option: 128-bit or 256-bit
Question10: START
What does HTTPS stand for? (CO3)
Question10: END
Option_a: HyperText Transfer Protocol Secure
Option_b: HyperTransfer Text Protocol Secure
Option_c: HyperThread Transfer Protocol Secure
Option_d: HighText Transfer Protocol Secure
correct_option: HyperText Transfer Protocol Secure
Question11: START
Which cryptographic protocol was introduced to replace SSL? (CO3)
Question11: END
Option_a: IPSec
Option_b: HTTPS
Option_c: TLS
Option_d: SSH
correct_option: TLS
Question12: START
What is the primary function of TLS? (CO3)
Question12: END
Option_a: Secure online transactions and communications
Option_b: Enhance web page loading speed
Option_c: Block pop-up advertisements
Option_d: Optimize search engine ranking
correct_option: Secure online transactions and communications
Question13: START
Which version of TLS is considered the most secure as of recent updates? (CO3)
Question13: END
Option_a: TLS 1.0
Option_b: TLS 1.1
Option_c: TLS 1.2
Option_d: TLS 1.3
correct_option: TLS 1.3
Question14: START
Which of the following is NOT a feature of TLS? (CO3)
Question14: END
Option_a: Encryption
Option_b: Authentication
Option_c: Compression
Option_d: Data Integrity
correct_option: Compression
Question15: START
What type of encryption does TLS use? (CO3)
Question15: END
Option_a: Symmetric encryption only
Option_b: Asymmetric encryption only
Option_c: Both symmetric and asymmetric encryption
Option_d: Hashing only
correct_option: Both symmetric and asymmetric encryption
Question16: START
Which of the following protocols uses TLS to secure email communication? (CO3)
Question16: END
Option_a: SMTP
Option_b: FTP
Option_c: HTTP
Option_d: Telnet
correct_option: SMTP
Question17: START
Which port is commonly used for secure HTTP traffic using TLS? (CO3)
Question17: END
Option_a: 443
Option_b: 80
Option_c: 21
Option_d: 22
correct_option: 443
Question18: START
Which attack does TLS help to prevent? (CO3)
Question18: END
Option_a: Man-in-the-middle attack
Option_b: DDoS attack
Option_c: SQL injection
Option_d: Phishing attack
correct_option: Man-in-the-middle attack
Question19: START
Which layer of the OSI model does TLS operate at? (CO3)
Question19: END
Option_a: Network layer
Option_b: Transport layer
Option_c: Session layer
Option_d: Application layer
correct_option: Transport layer
Question20: START
What is the role of the handshake protocol in TLS? (CO3)
Question20: END
Option_a: Establishes a secure session between client and server
Option_b: Encrypts the entire data stream
Option_c: Verifies firewall configurations
Option_d: Speeds up data transmission
correct_option: Establishes a secure session between client and server
Question21: START
What is the primary purpose of the Record Protocol in TLS? (CO3)
Question21: END
Option_a: To ensure message confidentiality and integrity
Option_b: To authenticate users
Option_c: To manage IP addresses
Option_d: To encrypt passwords only
correct_option: To ensure message confidentiality and integrity
Question22: START
Which protocol is often used with TLS to secure email communications? (CO3)
Question22: END
Option_a: SMTP
Option_b: POP3
Option_c: IMAP
Option_d: All of the above
correct_option: All of the above
Question23: START
Which of the following is a key component of the TLS handshake process? (CO3)
Question23: END
Option_a: Cipher suite negotiation
Option_b: Web page caching
Option_c: Email verification
Option_d: Network address translation
correct_option: Cipher suite negotiation
Question24: START
What does Perfect Forward Secrecy (PFS) in TLS ensure? (CO3)
Question24: END
Option_a: Past communications remain secure even if a private key is compromised
Option_b: Faster encryption speeds
Option_c: Reduced need for authentication
Option_d: Lower bandwidth consumption
correct_option: Past communications remain secure even if a private key is compromised
Question25: START
Which type of malware allows remote access to a victim’s computer? (CO4)
Question25: END
Option_a: Adware
Option_b: Remote Access Trojan (RAT)
Option_c: Keylogger
Option_d: Worm
correct_option: Remote Access Trojan (RAT)
Question26: START
Which encryption algorithm is commonly used in TLS for symmetric encryption? (CO3)
Question26: END
Option_a: AES
Option_b: RSA
Option_c: MD5
Option_d: SHA-1
correct_option: AES
Question27: START
How does TLS ensure data integrity? (CO3)
Question27: END
Option_a: By using Message Authentication Codes (MACs)
Option_b: By compressing data before transmission
Option_c: By preventing all network attacks
Option_d: By using IP-based authentication
correct_option: By using Message Authentication Codes (MACs)
Question28: START
Which type of attack can be mitigated using TLS? (CO3)
Question28: END
Option_a: Eavesdropping
Option_b: Phishing
Option_c: Brute force
Option_d: Ransomware
correct_option: Eavesdropping
Question29: START
Which of the following statements about TLS certificates is true? (CO3)
Question29: END
Option_a: TLS certificates authenticate a server's identity
Option_b: TLS certificates encrypt all network traffic
Option_c: TLS certificates replace firewalls
Option_d: TLS certificates block viruses
correct_option: TLS certificates authenticate a server's identity
Question30: START
What does OCSP stand for in the context of TLS? (CO3)
Question30: END
Option_a: Online Certificate Status Protocol
Option_b: Open Cipher Security Protocol
Option_c: Official Cyber Security Policy
Option_d: Optimized Cryptographic Secure Processing
correct_option: Online Certificate Status Protocol
Question31: START
What is the role of a Certification Authority (CA) in TLS? (CO3)
Question31: END
Option_a: Issuing digital certificates to verify authenticity
Option_b: Managing encryption keys
Option_c: Blocking malicious websites
Option_d: Encrypting browser cookies
correct_option: Issuing digital certificates to verify authenticity
Question32: START
What is the primary purpose of the Secure Electronic Transaction (SET) protocol?
Question32: END
Option_a: To ensure secure online transactions
Option_b: To replace SSL/TLS for all internet communications
Option_c: To provide anonymous transactions
Option_d: To encrypt emails only
correct_option: To ensure secure online transactions
Question33: START
Which two companies originally developed the SET protocol?
Question33: END
Option_a: Microsoft and Google
Option_b: Visa and MasterCard
Option_c: IBM and PayPal
Option_d: Apple and Amazon
correct_option: Visa and MasterCard
Question34: START
Which cryptographic technique does SET primarily use for securing transactions?
Question34: END
Option_a: Symmetric encryption only
Option_b: Asymmetric encryption only
Option_c: A combination of symmetric and asymmetric encryption
Option_d: Hashing only
correct_option: A combination of symmetric and asymmetric encryption
Question35: START
Which of the following is NOT a key component of the SET protocol?
Question35: END
Option_a: Cardholder
Option_b: Merchant
Option_c: Acquirer
Option_d: Internet Service Provider
correct_option: Internet Service Provider
Question36: START
What is the purpose of the dual signature in the SET protocol?
Question36: END
Option_a: To provide authentication and integrity
Option_b: To ensure both buyer and seller sign the transaction
Option_c: To link payment information and order information securely
Option_d: To replace digital certificates
correct_option: To link payment information and order information securely
Question37: START
In SET, who issues the digital certificates for authentication?
Question37: END
Option_a: Certificate Authority (CA)
Option_b: The Merchant
Option_c: The Acquirer
Option_d: The Cardholder
correct_option: Certificate Authority (CA)
Question38: START
Which encryption algorithm is commonly used in SET for secure communication?
Question38: END
Option_a: AES
Option_b: DES
Option_c: RSA
Option_d: MD5
correct_option: RSA
Question39: START
What is the role of the Payment Gateway in SET?
Question39: END
Option_a: To process the payment authorization
Option_b: To store credit card information
Option_c: To verify the customer’s email
Option_d: To generate a digital certificate
correct_option: To process the payment authorization
Question40: START
Which key does the cardholder use to encrypt the order information in SET?
Question40: END
Option_a: Merchant’s public key
Option_b: Acquirer’s public key
Option_c: Their own private key
Option_d: Their own public key
correct_option: Merchant’s public key
Question41: START
Which of the following is NOT a phase in the SET protocol?
Question41: END
Option_a: Cardholder registration
Option_b: Payment authorization
Option_c: Shipping verification
Option_d: Purchase request
correct_option: Shipping verification
Question42: START
What does SET use to verify the authenticity of transaction participants?
Question42: END
Option_a: OTP authentication
Option_b: Biometric authentication
Option_c: Digital certificates
Option_d: Static passwords
correct_option: Digital certificates
Question43: START
What is the main disadvantage of the SET protocol?
Question43: END
Option_a: High computational overhead
Option_b: Weak encryption methods
Option_c: Lack of merchant verification
Option_d: No support for online banking
correct_option: High computational overhead
Question44: START
Which organization plays the role of a trusted third party in SET?
Question44: END
Option_a: The Merchant
Option_b: The Cardholder
Option_c: Certificate Authority (CA)
Option_d: The Acquirer
correct_option: Certificate Authority (CA)
Question45: START
What type of certificate is issued to merchants in SET?
Question45: END
Option_a: Root certificate
Option_b: Payment Gateway certificate
Option_c: Merchant certificate
Option_d: Acquirer certificate
correct_option: Merchant certificate
Question46: START
What does the acronym PAN stand for in the SET protocol?
Question46: END
Option_a: Personal Account Number
Option_b: Payment Authorization Number
Option_c: Public Authentication Network
Option_d: Private Access Node
correct_option: Personal Account Number
Question47: START
What does SET primarily aim to protect during an online transaction?
Question47: END
Option_a: Customer’s name and address
Option_b: Only the merchant’s information
Option_c: Cardholder’s payment details
Option_d: Internet speed and performance
correct_option: Cardholder’s payment details
Question48: START
Which of the following is NOT a characteristic of SET?
Question48: END
Option_a: Confidentiality
Option_b: Integrity
Option_c: Anonymity
Option_d: Authentication
correct_option: Anonymity
Question49: START
How does SET ensure that merchants cannot see the cardholder’s payment information?
Question49: END
Option_a: By encrypting the order using the acquirer’s public key
Option_b: By using a dual signature to separate order and payment details
Option_c: By sending the credit card details directly to the merchant
Option_d: By requiring a PIN code from the cardholder
correct_option: By using a dual signature to separate order and payment details
Question50: START
Which of the following best describes a dual signature in SET?
Question50: END
Option_a: A single signature used twice
Option_b: A combination of two separate private keys
Option_c: A signature that links order and payment information securely
Option_d: A method of encrypting the payment details
correct_option: A signature that links order and payment information securely
Question51: START
Which key does the cardholder use to create the dual signature in SET?
Question51: END
Option_a: The merchant’s public key
Option_b: The acquirer’s private key
Option_c: The cardholder’s private key
Option_d: The certificate authority’s private key
correct_option: The cardholder’s private key
Question52: START
What role does the acquirer play in the SET protocol?
Question52: END
Option_a: Issues digital certificates to merchants
Option_b: Processes and verifies payments from cardholders
Option_c: Provides internet access for secure transactions
Option_d: Stores customer order details
correct_option: Processes and verifies payments from cardholders
Question53: START
In SET, what is the primary function of the Payment Gateway?
Question53: END
Option_a: Encrypts customer data
Option_b: Authenticates both the cardholder and merchant
Option_c: Acts as an intermediary between the merchant and acquirer
Option_d: Stores payment information
correct_option: Acts as an intermediary between the merchant and acquirer
Question54: START
Why was the SET protocol not widely adopted for online transactions?
Question54: END
Option_a: It was too slow for real-time transactions
Option_b: It required complex infrastructure and was costly
Option_c: It was less secure than SSL
Option_d: It lacked support for credit card payments
correct_option: It required complex infrastructure and was costly
Question55: START
Which of the following protocols eventually became more widely used than SET?
Question55: END
Option_a: Secure Shell (SSH)
Option_b: Secure Sockets Layer (SSL)
Option_c: File Transfer Protocol (FTP)
Option_d: Hypertext Transfer Protocol (HTTP)
correct_option: Secure Sockets Layer (SSL)
Question56: START
What is the function of hash functions in the SET protocol?
Question56: END
Option_a: To encrypt credit card numbers
Option_b: To verify data integrity
Option_c: To generate encryption keys
Option_d: To store digital certificates
correct_option: To verify data integrity
Question57: START
Which component in SET verifies the merchant’s legitimacy?
Question57: END
Option_a: The cardholder
Option_b: The acquirer
Option_c: The payment gateway
Option_d: The certificate authority
correct_option: The certificate authority
Question58: START
What type of key is included in a digital certificate issued to a cardholder in SET?
Question58: END
Option_a: Private key
Option_b: Public key
Option_c: Session key
Option_d: Symmetric key
correct_option: Public key
Question59: START
Which of the following is a limitation of SET compared to SSL?
Question59: END
Option_a: SET does not support encryption
Option_b: SET requires more computational resources
Option_c: SET does not use digital signatures
Option_d: SET is less secure than SSL
correct_option: SET requires more computational resources
Question60: START
What does the merchant send to the acquirer in the payment authorization phase of SET?
Question60: END
Option_a: The cardholder’s private key
Option_b: The encrypted order details and transaction details
Option_c: The dual signature of the acquirer
Option_d: The certificate authority’s public key
correct_option: The encrypted order details and transaction details
Question61: START
Which of the following does SET use to protect against replay attacks?
Question61: END
Option_a: Nonce values
Option_b: Password authentication
Option_c: Symmetric encryption
Option_d: Time delay mechanisms
correct_option: Nonce values
Question62: START
Which of the following is an example of a worm? (CO1)
Question62: END
Option_a: Melissa
Option_b: Stuxnet
Option_c: Trojan.Downloader
Option_d: Zeus
correct_option: Stuxnet
Question63: START
What does a rootkit primarily do? (CO1)
Question63: END
Option_a: Encrypt files for ransom
Option_b: Hide the presence of malicious software
Option_c: Spread across networks without user intervention
Option_d: Slow down computer processing
correct_option: Hide the presence of malicious software
Question64: START
What type of malware records a user's keystrokes to steal sensitive data? (CO1)
Question64: END
Option_a: Worm
Option_b: Keylogger
Option_c: Ransomware
Option_d: Adware
correct_option: Keylogger
Question65: START
Which of the following is NOT a characteristic of a computer worm? (CO1)
Question65: END
Option_a: Self-replicating
Option_b: Requires a host file
Option_c: Can spread through networks
Option_d: Can exploit vulnerabilities
correct_option: Requires a host file
Question66: START
What is the primary goal of ransomware? (CO1)
Question66: END
Option_a: Spy on user activities
Option_b: Encrypt data and demand payment
Option_c: Overload network traffic
Option_d: Redirect users to malicious websites
correct_option: Encrypt data and demand payment
Question67: START
Which firewall type is best suited for filtering traffic at the transport layer? (CO2)
Question67: END
Option_a: Packet filtering firewall
Option_b: Circuit-level gateway
Option_c: Application firewall
Option_d: Host-based firewall
correct_option: Circuit-level gateway
Question68: START
A proxy firewall works by: (CO2)
Question68: END
Option_a: Blocking all outgoing traffic
Option_b: Intercepting requests and forwarding them on behalf of users
Option_c: Encrypting all network traffic
Option_d: Preventing DoS attacks
correct_option: Intercepting requests and forwarding them on behalf of users
Question69: START
Which firewall configuration method is considered the most secure? (CO2)
Question69: END
Option_a: Allow all traffic, deny specific addresses
Option_b: Deny all traffic, allow specific addresses
Option_c: Allow and deny based on user behavior
Option_d: Only monitor but do not block traffic
correct_option: Deny all traffic, allow specific addresses
Question70: START
What is a major disadvantage of a packet-filtering firewall? (CO2)
Question70: END
Option_a: It cannot filter based on application data
Option_b: It slows down network traffic significantly
Option_c: It is expensive to implement
Option_d: It requires constant updates
correct_option: It cannot filter based on application data
Question71: START
Which firewall type integrates deep packet inspection, application control, and intrusion prevention?
(CO2)
Question71: END
Option_a: Proxy firewall
Option_b: Stateful firewall
Option_c: Next-generation firewall
Option_d: Circuit-level firewall
correct_option: Next-generation firewall
Question72: START
What is the main function of a Network-Based IDS (NIDS)? (CO3)
Question72: END
Option_a: Protecting local files
Option_b: Monitoring network traffic for suspicious activities
Option_c: Encrypting communications
Option_d: Preventing unauthorized physical access
correct_option: Monitoring network traffic for suspicious activities
Question73: START
Which of the following is a benefit of an IPS over an IDS? (CO3)
Question73: END
Option_a: IPS actively blocks threats
Option_b: IPS does not require monitoring
Option_c: IPS cannot be bypassed
Option_d: IPS is less expensive than IDS
correct_option: IPS actively blocks threats
Question74: START
Which of the following is an example of an intrusion detection technique? (CO3)
Question74: END
Option_a: Signature-based detection
Option_b: Phishing attack
Option_c: DNS spoofing
Option_d: Network congestion
correct_option: Signature-based detection
Question75: START
Which IDS/IPS detection method relies on a database of known attack patterns? (CO3)
Question75: END
Option_a: Anomaly-based detection
Option_b: Signature-based detection
Option_c: Heuristic detection
Option_d: Statistical detection
correct_option: Signature-based detection
Question76: START
Which security measure is commonly paired with IDS for enhanced threat response? (CO3)
Question76: END
Option_a: VPN
Option_b: Firewall
Option_c: Cloud backup
Option_d: Email filtering
correct_option: Firewall
Question77: START
What is the primary purpose of a honeypot in cybersecurity? (CO4)
Question77: END
Option_a: To detect and analyze attacks
Option_b: To prevent unauthorized access
Option_c: To block network traffic
Option_d: To filter spam emails
correct_option: To detect and analyze attacks
Question78: START
A zero-day vulnerability is: (CO4)
Question78: END
Option_a: A security flaw discovered after a patch is released
Option_b: An unknown security flaw with no available fix
Option_c: A vulnerability in an expired software license
Option_d: A security setting in operating systems
correct_option: An unknown security flaw with no available fix
Question79: START
Which of the following is NOT a common cyber attack? (CO4)
Question79: END
Option_a: Phishing
Option_b: Man-in-the-middle
Option_c: Network balancing
Option_d: SQL Injection
correct_option: Network balancing
Question80: START
What is the primary goal of penetration testing? (CO4)
Question80: END
Option_a: To recover lost data
Option_b: To find and exploit security weaknesses
Option_c: To detect hardware failures
Option_d: To improve system speed
correct_option: To find and exploit security weaknesses
Question81: START
A botnet is typically used for: (CO4)
Question81: END
Option_a: Running software updates
Option_b: Coordinating large-scale cyber attacks
Option_c: Preventing malware infections
Option_d: Monitoring network traffic
correct_option: Coordinating large-scale cyber attacks
Question82: START
What does Multi-Factor Authentication (MFA) add to user security? (CO4)
Question82: END
Option_a: A secondary method of authentication
Option_b: Faster login times
Option_c: Automatic password reset
Option_d: Stronger encryption
correct_option: A secondary method of authentication
Question83: START
Which term describes an attack where traffic is secretly intercepted and modified? (CO4)
Question83: END
Option_a: Phishing
Option_b: Denial of Service
Option_c: Man-in-the-middle
Option_d: Ransomware
correct_option: Man-in-the-middle
Question84: START
Which security principle ensures data remains unaltered during transmission? (CO4)
Question84: END
Option_a: Confidentiality
Option_b: Integrity
Option_c: Availability
Option_d: Redundancy
correct_option: Integrity
Question85: START
Which protocol is commonly used to secure web traffic? (CO4)
Question85: END
Option_a: FTP
Option_b: HTTP
Option_c: HTTPS
Option_d: Telnet
correct_option: HTTPS
Question86: START
Which of the following is a primary function of S/MIME in email security? (CO1)
Question86: END
Option_a: Encrypting and digitally signing emails
Option_b: Blocking spam emails
Option_c: Filtering phishing emails
Option_d: Detecting malware attachments
correct_option: Encrypting and digitally signing emails
Question87: START
Which encryption algorithm is commonly used in S/MIME for securing emails? (CO2)
Question87: END
Option_a: AES
Option_b: RSA
Option_c: SHA-256
Option_d: MD5
correct_option: RSA
Question88: START
What is the main purpose of an S/MIME digital signature? (CO1)
Question88: END
Option_a: To encrypt the email content
Option_b: To verify the sender’s identity and email integrity
Option_c: To prevent spam emails
Option_d: To filter unwanted advertisements
correct_option: To verify the sender’s identity and email integrity
Question89: START
Which of the following is NOT a common email spam detection technique? (CO3)
Question89: END
Option_a: Blacklist filtering
Option_b: Heuristic analysis
Option_c: Public key infrastructure (PKI)
Option_d: Bayesian filtering
correct_option: Public key infrastructure (PKI)
Question90: START
What role does the Certificate Authority (CA) play in S/MIME? (CO2)
Question90: END
Option_a: It encrypts all outgoing emails
Option_b: It verifies and issues digital certificates
Option_c: It scans emails for spam
Option_d: It prevents phishing attacks
correct_option: It verifies and issues digital certificates
Question91: START
Which of the following is NOT a component of an S/MIME email? (CO2)
Question91: END
Option_a: Digital certificate
Option_b: Digital signature
Option_c: Email header
Option_d: Biometric authentication
correct_option: Biometric authentication
Question92: START
Which type of attack does S/MIME help mitigate? (CO4)
Question92: END
Option_a: Phishing
Option_b: Man-in-the-middle
Option_c: Spoofing
Option_d: All of the above
correct_option: All of the above
Question93: START
What does Bayesian filtering analyze in email spam detection? (CO3)
Question93: END
Option_a: Email metadata
Option_b: Email subject and content probabilities
Option_c: The sender’s IP address
Option_d: The presence of digital signatures
correct_option: Email subject and content probabilities
Question94: START
Which of the following is NOT a method used for email spam filtering? (CO3)
Question94: END
Option_a: Greylisting
Option_b: Hashing algorithms
Option_c: Content-based filtering
Option_d: Blacklist-based filtering
correct_option: Hashing algorithms
Question95: START
Which port is commonly used for sending S/MIME encrypted emails using SMTP with TLS? (CO2)
Question95: END
Option_a: 110
Option_b: 143
Option_c: 587
Option_d: 25
correct_option: 587
Question96: START
Which of the following is a disadvantage of S/MIME? (CO4)
Question96: END
Option_a: It enhances email security
Option_b: It ensures email integrity
Option_c: It requires certificate management
Option_d: It prevents spam emails
correct_option: It requires certificate management
Question97: START
How does S/MIME protect email confidentiality? (CO2)
Question97: END
Option_a: By encrypting email content
Option_b: By using machine learning algorithms
Option_c: By detecting spam emails
Option_d: By analyzing email metadata
correct_option: By encrypting email content
Question98: START
What does DKIM stand for in email security? (CO3)
Question98: END
Option_a: Domain Key Infrastructure Management
Option_b: Domain Keys Identified Mail
Option_c: Digital Key Identified Mail
Option_d: Distributed Key Integrity Mechanism
correct_option: Domain Keys Identified Mail
Question99: START
Which of the following email authentication techniques works with S/MIME? (CO2)
Question99: END
Option_a: SPF
Option_b: DKIM
Option_c: DMARC
Option_d: All of the above
correct_option: All of the above
Question100: START
What is the primary advantage of using S/MIME over PGP for email encryption? (CO4)
Question100: END
Option_a: S/MIME uses symmetric encryption only
Option_b: S/MIME relies on a trusted Certificate Authority (CA)
Option_c: S/MIME does not require digital certificates
Option_d: S/MIME is completely spam-proof
correct_option: S/MIME relies on a trusted Certificate Authority (CA)