Quiz

Do you speak geek: All hail e-mail!

No doubt about it, e-mail is the most widely used computer application. Unfortunately, security isn't a byproduct of popularity. Take this quiz to find out where you stand when it comes to securing your organization's e-mail application. Click on the link to find the answer within the term's definition. When you're done with the quiz, visit our E-mail Security School to further sharpen your skills.

1. What is a secure method of sending e-mail that uses the RSA encryption system?
Answer

2. What is e-mail that has been directed to a recipient through a third-party server that does not identify the originator of the message?
Answer

3. What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?
Answer

4. What is the name for Microsoft's proposed e-mail sender authentication protocol designed to protect against domain spoofing and phishing exploits?
Answer

5. What document must end-users agree to follow in order to be provided with access to a network and its applications, including e-mail?
Answer

6. What type of scam involves the sending of legitimate-looking e-mails appearing to come from some of the Web's biggest sites in an effort to gather personal and financial information from the recipient?
Answer

7. What is the term for an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database?
Answer

8. What protocol ensures privacy between communicating applications and their users on the Internet?
Answer

9. What term describes the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source?
Answer

10. What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?
Answer

How'd you do? Let us know: cferraro@techtarget.com
9-10 correct: E-mail excellence
6-8 correct: E-mail expert
3-5 correct: E-mail amateur
0-2 correct: Return to sender

LEARN MORE ABOUT E-MAIL SECURITY:

  • Learn tactics for securing your e-mail systems, including virus and spam defense and policy control, in our E-mail Security School.
  • Learn the ten steps to a holistic secure messaging strategy.
  • Download Chapter 3, Understanding and Preventing Spam, from Kevin Beaver's "The Definitive Guide to E-mail Management and Security."
  • Balance the pros and cons of outsourcing antivirus services before handing over the keys to your kingdom.<

    TAKE OUR OTHER QUIZZES:

  • Test your knowledge of authentication methods.
  • Put your knowledge of the vulnerability management process on the line.
  • Do you know which encryption algorithms to use and when to use them? Test yourself.

    This was first published in February 2005

  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: