Quiz: Countermeasures for malicious email code

A five-question multiple-choice quiz to test your understanding of the content presented in Countermeasures for malicious email code lesson of SearchSecurity.com's Messaging Security School.

SearchSecurity.com Security School

Take this quiz to test your comprehension of the latest messaging-borne threats and how to combat them.

1. Fill in the blank: _________ are by far the most cost-effective products for minimizing the impact of a malware attack.

  1. Gateway technologies
  2. Desktop antivirus systems
  3. Linux-based servers
  4. Database encryption measures

2. Which element is not desired in an effective incident-reporting system?

  1. Canned reports.
  2. Easy-to-create customized reports.
  3. Simple CSV files.
  4. Easily exported reports.

3. Which example best represents how a security architect should develop his or her messaging malware defense architecture?

  1. Like a stack of bricks, so that systems don't rely on one another.
  2. Like a puzzle, with several different pieces fitting together and working as one.
  3. Like pods, where groups of two or three systems work together, but separately from other pods.
  4. None of the above.

4. Which is the most current and significant threat profile on the malware landscape?

  1. Boot viruses
  2. Macro viruses
  3. Network worms
  4. Bots and spyware
  5. Bluetooth and Wibro

5. Fill in the blank: The profile of information security's "bad guys" has evolved over the years. Today, they are most likely to be _________ .

  1. …teenagers with too much time on their hands.
  2. ...governments and political action committees.
  3. …serious hackers and coders with an axe to grind.
  4. …organized crime elements.
  5. …both b. and d.
  6. …both c. and d.

If you answered two or more questions incorrectly, revisit the materials from the Countermeasures for malicious email code lesson:

  • Tip: Strategic considerations for an integrated malware defense
  • Podcast: Fact or fiction: The future of email attacks
  • Webcast: Top tactics to beat ever-changing email threats

    If you answered four or more questions correctly, return to SearchSecurity.com's Messaging Security School and begin your next lesson.

  • This was last published in October 2006

    Dig Deeper on Email and Messaging Threats-Information Security Threats

    Start the conversation

    Send me notifications when other members comment.

    Please create a username to comment.