adplus-dvertising
frame-decoration

Question

Which of the following is not an anti-spam technique ?

a.

Reputation control

b.

Sender policy framework

c.

DNS-based block-list

d.

Domain-based blocking

Posted under Cyber Security

Answer: (d).Domain-based blocking

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the following is not an anti-spam technique ?

Similar Questions

Discover Related MCQs

Q. Which of the following is not an anti-spam technique?

Q. Which of the following is not a bulk emailing tool?

Q. Which of the following is not a bulk emailing tool ?

Q. Which of the following is not a type of spamming attack?

Q. There are _______ types of spamming.

Q. There are ___________ major ways of spamming.

Q. Which of the following is not a proper way of how spammers get the email Ids?

Q. ___________ are used which crawl web pages looking for email Ids and copies them to the database.

Q. Which of the following is not a technique used by spanners?

Q. _________________ technique is also used in product advertisement.

Q. ______________ is populating the inbox of any target victim with unsolicited or junk emails.

Q. Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.

Q. Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.

Q. Many social media sites and services provide _______________ for legitimate account verification.

Q. Part of the social media sites are the various games & 3rd party applications which helps ______________ to get access to your data.

Q. Strangers cannot cause much trouble if we connect to them over social media.

Q. Clicking on enticing Ads can cause trouble.

Q. Increase your security for social media account by always ____________ as you step away from the system.

Q. Keeping the password by the name of your pet is a good choice.

Q. Try to keep your passwords without meaning so that _____________ attack becomes almost impossible to perform successfully.