Messaging Security School

Quiz: Secure instant messaging

SearchSecurity.com Security School



Take this five-question quiz to see how much you've learned about securing instant messaging applications.

1. What is the main method used to execute an instant messenger attack?

  1. An instant messenger worm.
  2. An instant messenger virus.
  3. Social engineering.
  4. A Trojan horse.
  5. A man-in-the-middle attack.

2. Why are attacks using instant messaging becoming so popular?

  1. A large number of IM users.
  2. Most IM messages are not encrypted.
  3. Ability to transfer files via IM.
  4. Ability of IM traffic to bypass conventional firewalls.
  5. All of the above.

3. Why is a stolen IM password as dangerous for the victim's "buddies" as the victim them self?

  1. The victim can transfer malicious files to the victim's buddies.
  2. The victim can steal the passwords of the victim's buddies.
  3. The victim's buddies will not know if they are chatting with the victim or the attacker
  4. The victim can send links to malicious Web sites to the victim's buddies.
  5. The victim's buddies will need to change their account names.

4. When it comes to identifying a good enterprise IM service, which of these statements is false?

  1. It can block specific users or specific groups of users from accessing IM services.
  2. It can integrate access control into an operating system authentication mechanism like Active Directory.
  3. It needs to be backed up by a combination of desktop antivirus and antispyware solutions.
  4. It can filter hyperlinks, messages and files.
  5. It can prevent users from using unauthorized IM clients.

5. The advantage of encrypting instant message traffic is:

  1. Messages are encrypted while they are sent over the Internet.
  2. Messages are sent quicker when they are encrypted.
  3. Messages stored on the user's computer are encrypted.
  4. Keystroke loggers cannot capture confidential information in IM messages.
  5. All of the above.

If you answered two or more questions incorrectly, revisit the materials from the Secure instant messaging lesson:

  • Tip: Latest IM attacks still rely on social engineering
  • Podcast: Top 5 quick tips for safer instant messaging
  • Webcast: Top Technical Controls for Safeguarding IM

    If you answered four or more questions correctly, return to SearchSecurity.com's Messaging Security School and begin your next lesson.

    This was first published in October 2006

  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: