Thursday, December 17, 2015

Antispam and Antivirus test answers of 2016.

Find Complete and recently updated Correct Question and answers of Antispam and Antivirus. All Answers updated regularly with new questions. Upwork Antispam and Antivirus test answers of 2016.



Question:* Where might a spammer get your personal information from?

Answer: • All of these

Question:* Which of the following spam filtering techniques has the highest potential for generating false positives?

Answer: • Keyword Filtering

Question:* Automated spamming tools subscribe to mail lists in order to complete which of the following tasks?

Answer: • collect email addresses

Question:* A virus is a program that attaches itself to (or replaces the contents of) which of the following file types?

Answer: • Executables

Question:* Why shouldn't a user click unsubscribe links from spam messages?

Answer: • the click may validate the email address

Question:* What is an example of a Phishing scam?

Answer: • An email that appears to be legitimate, but is really being used to obtain personal or important information

Question:* In order to infect a system, clicking an email attachment must cause which of the following conditions to occur?

Answer: • the attachment executes

Question:* What could be a good indicator of a Spam email?

Answer: • All of these

Question:* In order for antivirus programs to be most effective, it is necessary to keep which of the following up to date?

Answer: • Virus definition files

Question:* Malware is short for

Answer: • Malicious Software

Question:* What is a good method for a website owner to confirm a user is not using an account for a spamming purposes?

Answer: • All of these

Question:* Which of the following is not a well known anti-virus program?

Answer: • SMAG

Question:* What is a captcha?

Answer: • It is a tool websites often use to prevent automated spammer bots from posting or registering on a website by forcing the user to do a task, often entering in letters or numbers based on a picture or audio, which verifies that they are human.

Question:* What are types of malware?

Answer: • All of these

Question:* How can you help stop spam?

Answer: • All of these

Question:* What is a keylogger?

Answer: • Software that records keystrokes made on a keyboard

Question:* Which of these is an example of a possible victim in a phishing attack?

Answer: • All of these

Question:* If you cannot delete malware infected file, what is good method to try first?

Answer: • Boot in Windows safe mode and attempt to delete the file

Question:* A virus can spread to another computer by

Answer: • Sharing an infected file with another computer

Question:* What is a computer virus?

Answer: • A type of malware that replicates itself and spreads to other files and/or computers.

Question:* Which of these techniques would be effective in helping to prevent phishing attacks by scammers?

Answer: • Scan for and fix XSS issues

Question:* What is the main difference between spyware and other malware?

Answer: • Spyware tends to steal or monitor data and/or personal information while malware encompasses all software that may been made with malicious intent in mind

Question:* What is a backdoor?

Answer: • A vulnerability in software that allows someone to bypass the normal authentication process

Question:* What is rogue security software?

Answer: • A fraudulent security program that appears to be helpful, but is actually not. It may deceive or mislead users into paying money to remove fake viruses or introduce malware after it is installed.

Question:* What run command can you use to check what programs load on startup?

Answer: • msconfig

Question:* Which of the following sites provide services for users to setup disposable emails?

Answer: • jetable.org

Question:* What is a botnet?

Answer: • A collection of computers working together to perform a single task. These computers are often penetrated by software containing malware.

Question:* What is an example of a "419" Scam

Answer: • A con in which someone asks you for assistance in retrieving a vast sum of money. Often it involves you helping him or her pay off certain fees and in return they promise to share the money with you.

Question:* A client asks you to fix his computer because it has ransomware on it. He says he sees a message as soon as he loads windows, and cannot do anything else. What is the best way to fix this computer without losing any of his data?

Answer: • Boot from a USB drive and run a program to remove the malware

Question:* Which is not an example of an anti-spyware tool?

Answer: • Kazaa

Question:* What is an example of a captcha?

Answer: • All of these

Question:* Virus infection via email attachments can be minimized using which of the following?

Answer: • Deleting mail containing attachments from unknown senders

Question:* Why are disposable email addresses useful?

Answer: • It is useful for someone who needs to give out their email or sign up to a website, but wants to protect their real email address from SPAM.

Question:* You have been told by several of your friends you have recently sent SPAM emails to them, what could be the cause of this and what should you do?

Answer: • A spammer or bot may have gained access to your email account and sent out SPAM to all of your contacts. You should change your password immediately.

Question:* Which of the following spam filtering issues stops valid messages from being delivered?

Answer: • false positives

Question:* Which is most likely something that could be considered strange account activity and may require further scrutiny on an e-commerce site?

Answer: • Orders from several user accounts are being sent to the same physical address

Question:* What is disposable email addressing?

Answer: • A practice in which you set a unique email address for sender/recipient communication. Disposable email addresses typically forward to one or more real email mailboxes where the owner can receive and read messages without revealing their true email.

Question:* What is ransomware?

Answer: • A software that hijacks your computer and asks you to pay in order for it to be removed

Question:* When a spammer forges the sender's address and enters an invalid receiver, which of the following settings will cause the receiving mail server to create backscatter?

Answer: • Bounce messages

Question:* In order to help prevent spam, a honeypot performs which of the following functions?

Answer: • acts as a desirable mail server in order to lure spammers

Question:* Performing outbound spam filtering does which of the following for an organization?

Answer: • helps prevent blacklisting

Question:* Which of the following techniques requires posting an email address where only spammers would find it?

Answer: • Spam Traps

Question:* What is CryptoLocker?

Answer: • A type of ransomware which encrypts user files and demands payment for the decryption key.

Question:* Which of the following reduces spam by rejecting mail from a specific ip addresses?

Answer: • DNS Blacklisting

Question:* Antivirus programs hash files on a computer in order to detect which of the following activities?

Answer: • File content changes

Question:* How can delivering mail as text instead of html help prevent spam?

Answer: • text mail prevents web bugs from alerting spammer that the message was opened

Question:* Which type of analysis is an antivirus program performing when it observes a file's activities in a sandbox or decompiles a file and analyzes its instructions?

Answer: • Heuristic Analysis

Question:* Which of the following characteristics classify a mail message as spam?

Answer: • it is unsolicited and indiscriminately addressed

Question:* Antivirus signatures are constructed using with of the following?

Answer: • Hashes

Question:* What is email spoofing?

Answer: • When someone forges or makes it appear that a email being sent is from a particular sender when it really is being sent by someone else.

Question:* Which of the following tools would NOT be useful in figuring out what spyware or viruses could be installed on a client's computer?

Answer: • WireShark

Question:* Which of the following is true of macro viruses?

Answer: • They depend on applications to propagate

Question:* In a compromised system, which of the following provides the safest way to analyze it?

Answer: • Live CD/DVD

Question:* Which of the following can prevent virus infections?

Answer: • Patching programs and the operating system

Question:* Is commercial SPAM legal in the United States?

Answer: • Yes, but only if it follows the standards listed in the CAN-SPAM Act of 2003

Question:* Which of the following differentiates a virus from a worm?

Answer: • a virus requires user interaction to infect a machine

Question:* Which of the following spam filtering techniques statistically analyzes mail?

Answer: • Bayesian Filtering

Question:* On a WordPress site, which is the default service/tool to prevent spammers from posting comments?

Answer: • Akismet

Question:* Which of the following best describes a distributed antivirus tool that consist of a scanning client and a corresponding web service?

Answer: • Cloud Antivirus

Question:* Firewalls help to prevent which of the following malware from propagating?

Answer: • Worms

Question:* What is the difference between a worm and virus?

Answer: • Unlike a virus, a worm does not need to attach itself to a program to spread.

Question:* Most spyware is used to...

Answer: • track a user's movement on the web or display pop-up ads

Question:* Polymorphic viruses randomly generate which of the following items before infecting a new file?

Answer: • mutation engine

Question:* A virus can hide itself from an antivirus software by doing which of the following?

Answer: • intercepting operating system read and write requests

Question:* Which of the following is true of a trojan virus?

Answer: • a Trojan doesn't self-replicate

Question:* Which of the following sites use disposable email addressing?

Answer: • Craigslist

Question:* When using greylist filtering, a message will be considered legitimate if it does which of the following?

Answer: • sends its message more than once

Question:* Which is not an example of a real life virus or worm discovered during the time period of 1980 to 2013?

Answer: • iRiot

Question:* In order to help prevent spam, a tarpit performs which of the following functions?

Answer: • delivers suspected spam messages more slowly



No comments:

HTML5 Upwork (oDesk) TEST ANSWERS 2022

HTML5 Upwork (oDesk) TEST ANSWERS 2022 Question: Which of the following is the best method to detect HTML5 Canvas support in web br...

Disqus for upwork test answers