Problem solve Get help with specific problems with your technologies, process and projects.

Quiz: Defending mobile devices from viruses, spyware and malware

Test your understanding of the content presented in Defending mobile devices from viruses and malware lesson of's Messaging Security School. Security SchoolThis quiz is part of's Security School lesson, Defending mobile devices from viruses, spyware and malware. Take this quiz to test your comprehension of the latest mobile malware and virus threats and how to mitigate them. 







1. Which mobile device platform has yet to be victimized by mobile malware?

  1. Symbian
  2. Microsoft
  3. BlackBerry
  4. None of the above

2. Fill in the blank: When choosing a mobile antivirus offering, look for ____________ .

  1. …a cost-effective product from a vendor you know.
  2. …how easily the product can assimilate into your existing infrastructure.
  3. …a stand-alone product that doesn't integrate with your other AV systems.
  4. …the newest product you can find, to ensure you have all the latest defenses.

3. Why does spam present a significant financial liability in the mobile realm?

  1. It eats up corporate bandwidth.
  2. Deleting it from devices is a time-consuming process.
  3. Cellular carriers often charge for certain messages, including spam.
  4. All of the above.
  5. None of the above.

4. Fill in the blank: Today there are approximately ____ different samples of malicious code that have been identified as infectious to mobile devices.

  1. 100
  2. 200
  3. 500
  4. 1,000
  5. 5,000

5. According to F-Secure, which of the choices below is not among the top four mobile virus vectors?

  1. Wi-Fi
  2. Bluetooth
  3. Multimedia Messaging System (MMS)
  4. Web downloads
  5. Swapping memory cards


If you answered two or more questions incorrectly, revisit the materials from the Defending mobile devices from viruses, spyware and malware lesson:

If you answered four or more questions correctly, return to's Messaging Security School and begin your next lesson.

This was last published in January 2007

Dig Deeper on Email and Messaging Threats-Information Security Threats