No doubt about it, e-mail is the most widely used computer application. Unfortunately, security isn't a byproduct of popularity. Take this quiz to find out where you stand when it comes to securing your organization's e-mail application. Click on the link to find the answer within the term's definition. When you're done with the quiz, visit our E-mail Security School to further sharpen your skills.
1. What is a secure method of sending e-mail that uses the RSA
encryption system?
Answer
2. What is e-mail that has been directed to a recipient through a
third-party server that does not identify the originator of the
message?
Answer
3. What do you call a program used to detect unsolicited and unwanted
e-mail and prevents those messages from getting to a user's inbox?
Answer
4. What is the name for Microsoft's proposed e-mail sender
authentication protocol designed to protect against domain spoofing
and phishing exploits?
Answer
5. What document must end-users agree to follow in order to be
provided with access to a network and its applications, including
e-mail?
Answer
6. What type of scam involves the sending of legitimate-looking
e-mails appearing to come from some of the Web's biggest sites in an
effort to gather personal and financial information from the
recipient?
Answer
7. What is the term for an attempt to determine the valid e-mail
addresses associated with an e-mail server so that they can be added
to a spam database?
Answer
8. What protocol ensures privacy between communicating applications
and their users on the Internet?
Answer
9. What term describes the forgery of an e-mail header so that the
message appears to have originated from someone or somewhere other
than the actual source?
Answer
10. What is the name for a program or programming code that
replicates by being copied or initiating its copying to another
program, computer boot sector or document?
Answer
How'd you do? Let us know: cferraro@techtarget.com
9-10 correct: E-mail excellence
6-8 correct: E-mail expert
3-5 correct: E-mail amateur
0-2 correct: Return to sender
LEARN MORE ABOUT E-MAIL SECURITY:
TAKE OUR OTHER QUIZZES:
This was first published in February 2005
Security Management Strategies for the CIO