Upwork Test Answers: Get all the correct answers of most recent and possible Upwork Tests A to Z (Updated on Jan, 2016)
Cover Letter Templates: These cover letter samples are not only for Upwork job, but also you will have some idea about your real life job
 
Freelance Profile Overviews: Different Profile samples and overviews of experts, advanced and intermediate level freelancers
For Newbie of Upwork: Upwork Help - How to apply for a job in Upwork with 10 most important articles about Upwork

A to Z View - All Upwork Test Answers

Antispam and Antivirus Test Answers

This is Networking category test and it will help you get the related job as the site is updating regularly. In this post, you will find most recent Upwork test questions with correct answers of Antispam and Antivirus test. Search your desired answers of the test questions by pressing Ctrl + F button.
--------------------------------------------------------------------------------------------------------------------------


1. Which of the following actions can be taken while filtering SMTP spam traffic?
 Answers: • Delete the spam mail -----or------• Redirect it to the spam mail box -----or------ • Tag the spam mail
 
 2. Which of the following files are mostly infected?
 Answers: • .DOT ---- or ---- • .EXE ----- or ------• .COM
 
 3. What is the function of MTA(Mail Transfer Agent)?
 Answers: • It receives and delivers the messages
 
 4. What is DHA?
 Answers: • Directory Harvest Attack
 
 5. How many keys are required if two parties communicate using Symmetric Cryptography?
 Answers: • One
 
 6. What is S/MIME?
 Answers: • Secure Multipurpose Internet Mail Extensions
 
 7. Which of the following antispam measures are taken to reduce spam?
 Answers: • All of the above
 
 8. Which of the following are famous worm attacks?
 Answers: • All of the above
 
 9. Which of the following techniques are used by spammers to find valid/existent email addresses?
 Answers: • Directory Harvest Attack
 
 10. Daniel has deployed an antispam solution in his network. Positive detection of non-spam SMTP is called:
 Answers: • False positive detection
 
 11. Which of the following techniques helps in cases of address forgery?
 Answers: • Path authentication
 
 12. Which of the following types of virus lives in the boot sector?
 Answers: • Bootstrap sector
 
 13. Which of the following is the Symmetric Algorithm used in cryptography?
 Answers: • El Gamal
 
 14. Suppose you got a mail from someone saying that you have won a $1 billion and asking you to give him/her $4000 to claim your prize. Under which category does this type of spam mail lie?
 Answers: • Phishing and Fraud
 
 15. What is botnet?
 Answers: • A software that runs automatically and autonomously.
 
 16. Which of the following goals cannot be achieved with the help of Symmetric Cryptography?
 Answers: • Availability.
 
 17. To which of the following components does the MUA(Mail User Agent) forward the mail while sending it to another host in the e-mail flow?
 Answers: • Mail Transfer Agent
 
 18. What is the maximum key length of AES?
 Answers: • 256
 
 19. Which of the following are disadvantages of the Symmetric Key Cryptography?
 Answers: • Key distribution.
 
 20. Which of the following are antivirus measures?
 Answers: • Install antivirus.
 
 21. Which of the following are the ways through which virus spreads?
 Answers: • All of the above
 
 22. Which of the following are categories of spam mails?
 Answers: • All of the above
 
 23. Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:
 Answers: • False negative
 
 24. Ques:Which of the following are preventive antivirus measures?
 Answers: • All of the above
 
 25. Which of the following ports is used by IMAP?
 Answers: • 143
 
 26. What are zombies?
 Answers: • Remotely controlled hosts.
 
 27. How many keys are required if two parties communicate using Asymmetric Cryptography?
 Answers: • Two
 
 28. Which of the following programs establishes modem connection with pay-per-visit resources?
 Answers: • Automatic dialers
 
 29. Suppose you got a mail from the HSBC bank asking you to give your online bank account details. Under which of the spam mail categories does this mail?
 Answers: • Phishing and fraud.
 
 30. What is Phishing?
 Answers: • Fraudulently acquiring sensitive information.
 
 31. Which of the following are direct harms caused by spam?
 Answers: • All of the above
 
 32. Which of the following is the Hashing Algorithm?
 Answers: • MD5
 
 33. Which key is used to decrypt the message in PKI?
 Answers: • Private Key.
 
 34. What is Joe Job?
 Answers: • A spam attack
 
 35. Which of the following are Email Security Protocols?
 Answers: • S/MIME
 
 36. Which of the following symmetric algorithms have variable key length?
 Answers: • Rivest Cipher 4
 
 37. What is Mail Exchanger(MX) Record?
 Answers: • Record in DNS specifying the internet email route.
 
 38. Which of the following measures should be taken to tackle spam mails?
 Answers: • All of the above
 
 39. Which of the following are different categories of viruses?
 Answers: • All of the above
 
 40. What is the function of the Reverse DNS Look up Technique in identifying spam mails?
 Answers: • To check the DNS server validity
 
 41. What is IMAP?
 Answers: • Internet Message Access Protocol
 
 42. Which of the following are threats to Email Security?
 Answers: • All of the above
 
 43. Which of the following symmetric encryption algorithms is/are supported by S/MIME?
 Answers: • RSA
 
 44. Which of the following are the disadvantages of verification?
 Answers: • All of the above
 
 45. How many antivirus programs should be installed on a single system?
 Answers: • 1
 
 46. Which of the following are indirect harms caused by spam?
 Answers: • Loss of reputation
 
 47. Which of the following are the benefits reaped from spam by those associated with antispam measures?
 Answers: • Antispam software sales
 
 48. What does "RBL" stands for in Email Security?
 Answers: • Realtime Blackhole List
 
 49. Dave is fetching mails from a server lying at a remote location. Which protocol is he using to fetch the mails?
 Answers: • POP3
 
 50. Which of the following programs is used by a user to send and receive emails?
 Answers: • Mail User Agent
 
 51. Which of the following are different types of spam filtering methods?
 Answers: • All of the above
 
 52. Which of the following is used in a Directory Harvest Attack?
 Answers: • Brute Force
 
 53. Which of the following resembles the Joe Job attack?
 Answers: • A spam attack that uses spoofed sender data and tarnishes the apparent sender's reputation
 
 54. Which of the following is an asymmetric algorithm?
 Answers: • El Gamal
 
 55. Which of the following is used to entangle spammers?
 Answers: • Honey pots
 
 56. Which of the following protocols is used on the sender side when an electronic mail is sent from one host to another?
 Answers: • SMTP
 
 57. Which of the following techniques are used to identify spam mails?
 Answers: • All of the above
 
 58. Which of the following actions can be taken while filtering POP3 spam traffic?
 Answers: • Redirect it to the spam mail box
 
 59. Which of the following is used to control zombies?
 Answers: • Trojan horses