Uncle Jim's Web Designs

Network Security Quiz

The value of a Network Administrator depends greatly on the knowledge they have accumulated during their career. Dealing with security issues is one of the top priorities of this job and can make or break your career. Take this basic security quiz to see if you are prepared to handle some of the most common security issues facing a Network Administrator.

  • Do not change your answer during the test as it will ruin the score.
    You may do this after scoring is calculated to see the other answers.
  • If you make a mistake, hit Clear below to restart the test!
  • This quiz is for entertainment purposes only.
    It is provided strictly as-is and for entertainment purposes only.

PART ONE: Network Security

1. This technology is used to measure and analyze human body characteristics for authentication purposes.?


2. This is an electronic or paper log used to track computer activity.

Web Log
Audit Trail

3. This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides.

Bit robbing
Port scan
Service profile identifier

4. This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.

Tiger team
Computer emergency response team
Silicone cockroach
Defense Advanced Research Projects Agency (DARPA)

5. This is a mechanism for ensuring that only authorized users can copy or use specific software applications.

Authorized program analysis report
Private key
Service level agreement

6. This is is the hiding of a secret message within an ordinary message and the extraction of it at its destination.

Secret key algorithm

7. This is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites.

Server accelerator card
Network interface card
Intelligent peripheral interface
Smart card

8. This is the name of a technology involving the monitoring of devices that emit electromagnetic radiation (EMR) in a manner that can be used to reconstruct intelligible data.

Reverse engineering
Magnetoresistive head technology
Van Eck phreaking
Electronic data processing (EDP)

9. This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.

Security Identifier (SID)
Public key infrastructure (PKI)
Private Branch Exchange (PBX)
Trusted Computing Platform Alliance (TCPA)

10. This is an assault on the integrity of a security system in which the attacker substitutes a section of ciphertext (encrypted text) with a different section that looks like (but is not the same as) the one removed.

Cut and paste attack
Switching fabric
Swap file

PART TWO: Network Hardware

11. This is a utility that rearranges your discontiguous files and free space on your computer so that your files are stored in contiguous units and free space is consolidated in one contiguous block.


12. This is a company that provides computer storage space and related management to other companies.

Storage service provider
Storage area network
Storage medium
Bastion host

13. This is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology.

Tape Archive
Digital Data Storage
Virtual tape system
Audio Interchange File Format

14. This is a storage management system especially designed for moving large files and large amounts of data around a network.

Hierarchical storage management
Distributed file system
High performance storage system
Holographic storage

15. This is a form of static random access memory whose contents are saved when a computer is turned off or loses its external power source.

SynchBurst SRAM
Nonvolatile storage
Magnetoresistive random access memory
Direct memory access

16. This is a centralized repository for business information that provides common data management and protection, as well as data sharing functions, through connections to numerous (and possibly dissimilar) computer systems.

Enterprise storage network
Network information system
ADSTAR Distributed Storage Management
Call center

17. This is programmable read-only memory that can be erased by shining an intense ultraviolet light through a window in the memory chip so that the memory can be re-used.

Grating light valve technology
Virtual memory
Extreme ultraviolet lithography
Erasable programmable read-only memory

18. This is a way of storing the same data in different places on multiple hard disks.

Network-attached storage
Redundant array of independent disks
Extended data output (EDO) RAM
Sequential read-only memory

19. This is a data storage technology that allows information to be written to a disk a single time and prevents the drive from erasing the data.

Write once / read many
Single instruction multiple data
Compact disk / read-only-memory, extended architecture
Backup domain control

20. This is what might occur when a program or process tries to store more data in a temporary data storage area than it was intended to hold.

Blue screen of death
Fatal exception
Shared memory
Buffer overflow