Quiz

Quiz: Spam 2.0 -- New threats and new strategies

SearchSecurity.com Security School
This quiz is part of Spam 2.0: New threats and new strategies, a lesson in SearchSecurity.com's Messaging Security School. Visit the lesson page or our Security School Course Catalog for additional learning resources.

1. In 2007, which is the main reason why spammers send spam?

  1. It is economically viable.
  2. There are minimal operating costs.
  3. The barriers to entry are non-existent.
  4. There is little or no chance of being caught.
  5. All of the above.

2. Why are botnets such a popular spam-sending tool?

  1. They are cheap to hire.
  2. They make it harder to trace the spammer.
  3. They make it possible to send thousands of messages with little chance of detection.
  4. There are no other viable ways to send thousands of spam messages.
  5. They enable spammers to circumvent content filtering.

3. Fill in the blank: Spam 2.0 is best described as __________ .

  1. Text-based spam
  2. Phishing emails
  3. One person's spam is another person's news
  4. Primarily image and PDF spam
  5. All of the above

4. Which of the following methods for combating spam gives the end user the most control over the emails they receive?

  1. Black lists and white lists
  2. Content filtering
  3. Traffic analysis
  4. Sender ID
  5. Bayesian filters

5. When reviewing how to tackle spam within an enterprise, what is the most important aspect of any set of recommendations?

  1. Effectiveness
  2. Granularity of control
  3. Scalability
  4. Cost benefit analysis
  5. Compatibility with existing infrastructure

If you answered two or more questions incorrectly, revisit the materials from the lesson Spam 2.0: New threats and new strategies:

  • Webcast: Next-generation spam
  • Tip: How to prevent spam bots
  • Podcast: Countdown -- Top five technologies to help battle the new spam threat

    If you answered four or more questions correctly, return to SearchSecurity.com's Messaging Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

    This was first published in November 2007

  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: