This is a quiz to test your security knowledge.
Gadgets used by secret agents
Clothing worn by the iSpy characters
A & B
Software used to spy on a user's computer activity
Forward it to co-workers for a good laugh
Send it to a client that is also a good friend
Post it on SharePoint
None of the above
Delete it immediately
Investigate by opening and launching the attachment
Inform your IT department of the suspicious message
Move it to the junk folder
None whatsoever
SPAM impacts network bandwidth and storage on mail servers
Very little
SPAM has the ability to transmit malware, viruses, and trojans via hyperlink or attachments which can reap havoc on a network
B & D
Respond to the message explaining that you're not interested
Tag the message as SPAM and delete
Sign up for a months' supply
Forward the e-mail to a personal e-mail account
Give him your work e-mail account
Have him upload it to your company's FTP site for retrieval at a later date
Give him your personal e-mail account
Tell him your not interested
Brad Pitt
A descendant of the legendary city of Troy
The famed Trojan horse that caused the fall of Troy
Computer code designed to allow a hacker remote control of a user's system
Log each time you open a door
Monitor and log the keys that are pressed on a keyboard
Monitor remote access to a PC
Log key events in the windows system log
Give him/her the WiFi code and grant them access
Confirm that the visitor's system is protected by Antivirus and then grant them access to the WiFi network
Apologize and explain that this access is ONLY for privileged visitors
All of the above
Upgrade the firewall firmware
Make sure the Exchange server does not permit an open relay
Block outbound port 25 traffic from all devices except the mail server
Block port 25 on each user's PC