Messaging Security School

Quiz: Countermeasures for malicious email code Security School

Take this quiz to test your comprehension of the latest messaging-borne threats and how to combat them.

1. Fill in the blank: _________ are by far the most cost-effective products for minimizing the impact of a malware attack.

  1. Gateway technologies
  2. Desktop antivirus systems
  3. Linux-based servers
  4. Database encryption measures

2. Which element is not desired in an effective incident-reporting system?

  1. Canned reports.
  2. Easy-to-create customized reports.
  3. Simple CSV files.
  4. Easily exported reports.

3. Which example best represents how a security architect should develop his or her messaging malware defense architecture?

  1. Like a stack of bricks, so that systems don't rely on one another.
  2. Like a puzzle, with several different pieces fitting together and working as one.
  3. Like pods, where groups of two or three systems work together, but separately from other pods.
  4. None of the above.

4. Which is the most current and significant threat profile on the malware landscape?

  1. Boot viruses
  2. Macro viruses
  3. Network worms
  4. Bots and spyware
  5. Bluetooth and Wibro

5. Fill in the blank: The profile of information security's "bad guys" has evolved over the years. Today, they are most likely to be _________ .

  1. …teenagers with too much time on their hands.
  2. ...governments and political action committees.
  3. …serious hackers and coders with an axe to grind.
  4. …organized crime elements.
  5. …both b. and d.
  6. …both c. and d.

If you answered two or more questions incorrectly, revisit the materials from the Countermeasures for malicious email code lesson:

  • Tip: Strategic considerations for an integrated malware defense
  • Podcast: Fact or fiction: The future of email attacks
  • Webcast: Top tactics to beat ever-changing email threats

    If you answered four or more questions correctly, return to's Messaging Security School and begin your next lesson.

    This was first published in October 2006

  • There are Comments. Add yours.

    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: