Messaging Security School

Quiz: Securing Microsoft Exchange

SearchSecurity.com Security School

Take this five-question quiz to see how much you've learned about Exchange security protocols, and security features.




1. Fill in the blank: To properly secure Exchange 2003, the best location for the front-end server is __________ .

  1. Outside the firewall a.
  2. In the perimeter (DMZ) network
  3. In the internal network
  4. In the internal network, but with ISA in the perimeter (DMZ)
  5. At a hosted location

2. The Intelligent Message Filter (IMF) spam filter comes with Exchange 2003 SP2. After configuring it, what step or steps do you need to take to make it operational?

  1. Enable the SMTP Service.
  2. Enable on IIS Virtual Directory, then restart SMTP Service.
  3. Enable on SMTP Virtual Server, then restart IMF Service.
  4. Enable on SMTP Virtual Server, then restart SMTP Service.
  5. Enable the IMF Service.

3. Which Exchange protocols can be secured using IIS to require SSL and 128bit encryption?

  1. Outlook Web Access.
  2. SMTP with TLS.
  3. Server-ActiveSync.
  4. Both A and B.
  5. Both A and C.

4. Why is SenderID useful for detecting spam messages containing phishing links?

  1. SenderID uses DNS Reverse Lookup to validate the sender's domain.
  2. SenderID checks for a fake or spoofed sending email address.
  3. SenderID checks if the originating IP address is authorized to send mail for the sending domain.
  4. SenderID checks if the receiving IP address is authorized to accept mail from the sending domain.
  5. SenderID is an organization that puts an electronic stamp on member organization emails to validate them.

5. Which of the following methods is not a secure way to connect clients to Exchange?

  1. Outlook Web Access over HTTPS.
  2. Outlook using MAPI/RPC.
  3. Outlook using IMAP4 with SSL.
  4. Outlook using IMAP4 with SSL
  5. Outlook using RPC over HTTPS.

If you answered two or more questions incorrectly, revisit the materials from the Securing Microsoft Exchange lesson:

  • Tip: VPN or RPC/HTTPS? Both have their place
  • Podcast: Exchange security: A quick primer
  • Webcast: Best practices to secure Exchange

    If you answered four or more questions correctly, return to SearchSecurity.com's Messaging Security School and begin your next lesson.

    This was first published in November 2006

  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: