Do you speak geek: All hail e-mail!


Do you speak geek: All hail e-mail!

No doubt about it, e-mail is the most widely used computer application. Unfortunately, security isn't a byproduct of popularity. Take this quiz to find out where you stand when it comes to securing your organization's e-mail application. Click on the link to find the answer within the term's definition. When you're done with the quiz, visit our E-mail Security School to further sharpen your skills.

1. What is a secure method of sending e-mail that uses the RSA encryption system?

2. What is e-mail that has been directed to a recipient through a third-party server that does not identify the originator of the message?

3. What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?

4. What is the name for Microsoft's proposed e-mail sender authentication protocol designed to protect against domain spoofing and phishing exploits?

5. What document must end-users agree to follow in order to be provided with access to a network and its applications, including e-mail?

6. What type of scam involves the sending of legitimate-looking e-mails appearing to come from some of the Web's biggest sites in an effort to gather personal and financial information from the recipient?

7. What is the term for an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database?

8. What protocol ensures privacy between communicating applications and their users on the Internet?

9. What term describes the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source?

10. What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

How'd you do? Let us know:
9-10 correct: E-mail excellence
6-8 correct: E-mail expert
3-5 correct: E-mail amateur
0-2 correct: Return to sender


  • Learn tactics for securing your e-mail systems, including virus and spam defense and policy control, in our E-mail Security School.
  • Learn the ten steps to a holistic secure messaging strategy.
  • Download Chapter 3, Understanding and Preventing Spam, from Kevin Beaver's "The Definitive Guide to E-mail Management and Security."
  • Balance the pros and cons of outsourcing antivirus services before handing over the keys to your kingdom.<


  • Test your knowledge of authentication methods.
  • Put your knowledge of the vulnerability management process on the line.
  • Do you know which encryption algorithms to use and when to use them? Test yourself.

  • Email Alerts

    Register now to receive IT-related news, guides and more, delivered to your inbox.
    By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

    COMMENTS powered by Disqus  //  Commenting policy