in Education by
Which of the following is not a strong security protocol? (a) HTTPS (b) SSL (c) SMTP (d) SFTP I had been asked this question at a job interview. Asked question is from Security Protocols topic in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (c) SMTP The best I can explain: SMTP (is abbreviated as Simple Mail Transfer Protocol) is a standard protocol to transmit electronic mail and is a widely used mail transmitting protocol.

Related questions

0 votes
    Which among the following is the least strong security encryption standard? (a) WEP (b) WPA (c) WPA2 ( ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
0 votes
    In which of the following cases Session Initiation Protocol is not used? (a) Instant Messaging (b) Voice over LTE ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    It is recommended to use WPA2 or WPA3 encryption standard as they are strong and more secure. (a) True ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the protocol is not used in the network layer of the TCP/IP model? (a) ICMP (b) IP (c) IGMP ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the below-mentioned protocol is not susceptible to sniffing? (a) HTTP (b) SMTP (c) POP (d) ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the below-mentioned protocol is not susceptible to sniffing? (a) NNTP (b) UDP (c) FTP (d) ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not considering the adequate measure for physical security? (a) Lock the drawers (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a physical security measure to protect against physical hacking? (a) Add front desk ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following do not comes under security measures for cloud in firms? (a) Firewall (b) Antivirus (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following will not help in preserving email security? (a) Create a strong password (b) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a security issue for PDAs? (a) Password theft (b) Data theft (c) ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    From the options below, which of them is not a threat to information security? (a) Disaster (b) Eavesdropping (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    From the options below, which of them is not a vulnerability to information security? (a) flood (b) without ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...