Quiz: Secure instant messaging

A five-question multiple choice quiz to test your understanding of the content presented in the Secure instant messaging lesson of SearchSecurity.com's Messaging Security School.

SearchSecurity.com Security School

Take this five-question quiz to see how much you've learned about securing instant messaging applications.

1. What is the main method used to execute an instant messenger attack?

  1. An instant messenger worm.
  2. An instant messenger virus.
  3. Social engineering.
  4. A Trojan horse.
  5. A man-in-the-middle attack.

2. Why are attacks using instant messaging becoming so popular?

  1. A large number of IM users.
  2. Most IM messages are not encrypted.
  3. Ability to transfer files via IM.
  4. Ability of IM traffic to bypass conventional firewalls.
  5. All of the above.

3. Why is a stolen IM password as dangerous for the victim's "buddies" as the victim them self?

  1. The victim can transfer malicious files to the victim's buddies.
  2. The victim can steal the passwords of the victim's buddies.
  3. The victim's buddies will not know if they are chatting with the victim or the attacker
  4. The victim can send links to malicious Web sites to the victim's buddies.
  5. The victim's buddies will need to change their account names.

4. When it comes to identifying a good enterprise IM service, which of these statements is false?

  1. It can block specific users or specific groups of users from accessing IM services.
  2. It can integrate access control into an operating system authentication mechanism like Active Directory.
  3. It needs to be backed up by a combination of desktop antivirus and antispyware solutions.
  4. It can filter hyperlinks, messages and files.
  5. It can prevent users from using unauthorized IM clients.

5. The advantage of encrypting instant message traffic is:

  1. Messages are encrypted while they are sent over the Internet.
  2. Messages are sent quicker when they are encrypted.
  3. Messages stored on the user's computer are encrypted.
  4. Keystroke loggers cannot capture confidential information in IM messages.
  5. All of the above.

If you answered two or more questions incorrectly, revisit the materials from the Secure instant messaging lesson:

  • Tip: Latest IM attacks still rely on social engineering
  • Podcast: Top 5 quick tips for safer instant messaging
  • Webcast: Top Technical Controls for Safeguarding IM

    If you answered four or more questions correctly, return to SearchSecurity.com's Messaging Security School and begin your next lesson.

  • This was last published in October 2006

    Dig Deeper on Email and Messaging Threats-Information Security Threats