adplus-dvertising
1. There are _______ major ways of stealing email information.
a. 2
b. 3
c. 4
d. 5
Discuss
Answer: (b).3

2. Which of them is not a major way of stealing email information?
a. Stealing cookies
b. Reverse Engineering
c. Password Phishing
d. Social Engineering
Discuss
Answer: (b).Reverse Engineering

3. ____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.
a. Email security
b. Email hacking
c. Email protection
d. Email safeguarding
Discuss
Answer: (a).Email security

4. _____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.
a. Cloud
b. Pen drive
c. Website
d. Email
Discuss
Answer: (d).Email

5. Which of them is not a proper method for email security?
a. Use Strong password
b. Use email Encryption
c. Spam filters and malware scanners
d. Click on unknown links to explore
Discuss
Answer: (d).Click on unknown links to explore

6. If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.
a. True
b. False
c. May be True or False
d. Can't say
Discuss
Answer: (a).True

7. The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.
a. attackers, malware
b. hackers, antivirus
c. penetration testers, malware
d. penetration testers, virus
Discuss
Answer: (a).attackers, malware

8. If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.
a. memory
b. quarantine
c. cookies
d. hard drive
Discuss
Answer: (c).cookies

9. Which of the following is a non-technical type of intrusion or attack technique?
a. Reverse Engineering
b. Malware Analysis
c. Social Engineering
d. Malware Writing
Discuss
Answer: (c).Social Engineering

10. Which of them is an example of grabbing email information?
a. Cookie stealing
b. Reverse engineering
c. Port scanning
d. Banner grabbing
Discuss
Answer: (a).Cookie stealing

Page 1 of 10