Get started Bring yourself up to speed with our introductory content.

Do you speak geek: All hail email security!

Test your knowledge of email security with this quiz.

No doubt about it, email is the most widely used computer application. Unfortunately, security isn't a byproduct of popularity. Take this quiz to find out where you stand when it comes to email security in your organization. Click on the link to find the answer within the term's definition.

1. What is a secure method of sending email that uses the RSA encryption system?

2. What is email that has been directed to a recipient through a third-party server that does not identify the originator of the message?

3. What do you call a program that's used to detect unsolicited and unwanted email and that prevents those messages from getting to a user's inbox?

4. What is the name for Microsoft's proposed email sender authentication protocol designed to protect against domain spoofing and phishing exploits?

5. What document must end users agree to follow in order to be provided with access to a network and its applications, including email?

6. What type of scam involves the sending of legitimate-looking emails appearing to come from some of the Web's biggest sites in an effort to gather personal and financial information from the recipient?

7. What is the term for an attempt to determine the valid email addresses associated with an email server so that they can be added to a spam database?

8. What protocol ensures privacy between communicating applications and their users on the Internet?

9. What term describes the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source?

10. What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

How'd you do?
9-10 correct: Email excellence
6-8 correct: Email expert
3-5 correct: Email amateur
0-2 correct: Return to sender

Dig Deeper on Small-business IT strategy

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.