Uncle Jim's Web Designs

Network Security Quiz

The value of a Network Administrator depends greatly on the knowledge they have accumulated during their career. Dealing with security issues is one of the top priorities of this job and can make or break your career. Take this basic security quiz to see if you are prepared to handle some of the most common security issues facing a Network Administrator.

  • Do not change your answer during the test as it will ruin the score.
    You may do this after scoring is calculated to see the other answers.
  • If you make a mistake, hit Clear below to restart the test!
  • This quiz is for entertainment purposes only.
    It is provided strictly as-is and for entertainment purposes only.

PART ONE: Network Security


1. This technology is used to measure and analyze human body characteristics for authentication purposes.?

Footprinting
Biometrics
JBOD
Anthropomorphism
RESULT:


2. This is an electronic or paper log used to track computer activity.

Traceroute
Cookie
Web Log
Audit Trail
RESULT:


3. This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides.

Bit robbing
Jabber
Port scan
Service profile identifier
RESULT:


4. This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.

Tiger team
Computer emergency response team
Silicone cockroach
Defense Advanced Research Projects Agency (DARPA)
RESULT:


5. This is a mechanism for ensuring that only authorized users can copy or use specific software applications.

Authorized program analysis report
Private key
Service level agreement
Dongle
RESULT:


6. This is is the hiding of a secret message within an ordinary message and the extraction of it at its destination.

Secret key algorithm
Steganography
Bytecode
Spyware
RESULT:


7. This is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites.

Server accelerator card
Network interface card
Intelligent peripheral interface
Smart card
RESULT:


8. This is the name of a technology involving the monitoring of devices that emit electromagnetic radiation (EMR) in a manner that can be used to reconstruct intelligible data.

Reverse engineering
Magnetoresistive head technology
Van Eck phreaking
Electronic data processing (EDP)
RESULT:


9. This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.

Security Identifier (SID)
Public key infrastructure (PKI)
Private Branch Exchange (PBX)
Trusted Computing Platform Alliance (TCPA)
RESULT:


10. This is an assault on the integrity of a security system in which the attacker substitutes a section of ciphertext (encrypted text) with a different section that looks like (but is not the same as) the one removed.

Cut and paste attack
Hashing
Switching fabric
Swap file
RESULT:

PART TWO: Network Hardware


11. This is a utility that rearranges your discontiguous files and free space on your computer so that your files are stored in contiguous units and free space is consolidated in one contiguous block.

Degaussing
Patch
Defragmenter
Parser
RESULT:


12. This is a company that provides computer storage space and related management to other companies.

Storage service provider
Storage area network
Storage medium
Bastion host
RESULT:


13. This is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.

Tape Archive
Digital Data Storage
Virtual tape system
Audio Interchange File Format
RESULT:


14. This is a storage management system especially designed for moving large files and large amounts of data around a network.

Hierarchical storage management
Distributed file system
High performance storage system
Holographic storage
RESULT:


15. This is a form of static random access memory whose contents are saved when a computer is turned off or loses its external power source.

SynchBurst SRAM
Nonvolatile storage
Magnetoresistive random access memory
Direct memory access
RESULT:


16. This is a centralized repository for business information that provides common data management and protection, as well as data sharing functions, through connections to numerous (and possibly dissimilar) computer systems.

Enterprise storage network
Network information system
ADSTAR Distributed Storage Management
Call center
RESULT:


17. This is programmable read-only memory that can be erased by shining an intense ultraviolet light through a window in the memory chip so that the memory can be re-used.

Grating light valve technology
Virtual memory
Extreme ultraviolet lithography
Erasable programmable read-only memory
RESULT:


18. This is a way of storing the same data in different places on multiple hard disks.

Network-attached storage
Redundant array of independent disks
Extended data output (EDO) RAM
Sequential read-only memory
RESULT:


19. This is a data storage technology that allows information to be written to a disk a single time and prevents the drive from erasing the data.

Write once / read many
Single instruction multiple data
Compact disk / read-only-memory, extended architecture
Backup domain control
RESULT:


20. This is what might occur when a program or process tries to store more data in a temporary data storage area than it was intended to hold.

Blue screen of death
Fatal exception
Shared memory
Buffer overflow
RESULT: