The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards - and even then I have my doubts. -Eugene H. Spafford
How to take the quiz:
After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text or an approximation of it somewhere in the definition.
After reading the question, write down the letter of your answer choice on scrap paper. Check your answers by using the answer key at the end of the quiz.
1. This technology is used to measure and analyze human body characteristics for authentication purposes.
e. optical character recognition
3. This is a series of messages sent by someone attempting to break
into a computer to learn which computer network services the computer
a. bit robbing
b. Web services description language (WSDL)
d. port scan
e. service profile identifier
4. This is the name for a group of programmers who are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.
a. ERM group
b. computer emergency response team
c. tiger team
d. silicone cockroach
e. Defense Advanced Research Projects Agency (DARPA)
5. This is a mechanism for ensuring that only authorized users can copy or use specific software applications.
a. authorized program analysis report
b. private key
c. service level agreement
d. access log
6. This is is the hiding of a secret message within an ordinary
message and the extraction of it at its destination.
a. secret key algorithm
b. message queueing
7. This is a Peripheral Component Interconnect (PCI) card used
to generate encryption keys for secure transactions on e-commerce Web sites.
a. PCMCIA card
b. smart card
c. server accelerator card
d. network interface card
e. intelligent peripheral interface
8. This is the name of a technology involving the monitoring of devices
that emit electromagnetic radiation (EMR) in a manner that can be used
to reconstruct intelligible data.
a. reverse engineering
b. magnetoresistive head technology
c. van Eck phreaking
d. electronic data processing (EDP)
9. This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.
a. Security Identifier (SID)
b. public key infrastructure (PKI)
c. Internet Assigned Numbers Authority (IANA)
d. Private Branch Exchange (PBX)
e. Trusted Computing Platform Alliance (TCPA)
10. This is an assault on the integrity of a security system in which the attacker substitutes a section of ciphertext (encrypted text) with a different section that looks like (but is not the same as) the one removed.
a. Trojan horse
c. switching fabric
d. swap file
e. cut and paste attack
SCROLL DOWN FOR ANSWER KEY
To learn more, we recommend you visit our Middleware Security Issues section on searchMiddleware.
For more security terms and resources, we recommend you start at searchSecurity.com, a member of our techtarget.com community.
Be sure to try these other quizzes:
Quiz #1: Help Desk Basics
Quiz #2: Security Basics (you're on this Quiz now)
Quiz #3: Data Storage
Quiz #4: Networking Hardware
Quiz #5: Getting Your Message Across the Network
Quiz #6: Servers
Quiz #7: Protocols
Quiz #8: Database Basics
Quiz #9: Wireless
Quiz #10: TCP/IP
Quiz #11: Ego-Booster
Quiz #12: Database II
Quiz #13: AS/400
ANSWER KEY: 1b - 2e - 3d - 4c - 5e - 6e - 7c - 8c - 9b - 10e
Let us know how you did and suggest a topic for a future quiz! email@example.com