Passwords: Do you speak geek? - Quiz from


Passwords: Do you speak geek?

Part of the Security management glossary:

During his keynote speech at the RSA Security conference in February, Bill Gates predicted the demise of the traditional password because it cannot "meet the challenge" of keeping critical information secure. This week we challenge you to correctly identify ten password-related terms.

1. This is the process of determining whether someone is who he says he is.
What is it?

2. This kind of password is designed to be difficult for a person or program to discover; essential components include sufficient length and a mix of character types.
What is it?

3. This application program can be used by a network administrator to retrieve a forgotten password. Unfortunately, it can also be used by an intruder to obtain unauthorized access to resources.
What is it?

4. This type of authentication, when used with a security token, is expected by some experts to replace traditional passwords.
What is it?

5. This is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications.
What is it?

6. This describes what happens when users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices.
What is it?

7. This is a scam where the perpetrator sends out legitimate-looking e-mails appearing to come from a well-known Web site in an effort to get passwords and other sensitive information from the recipient.
What is it?

8. This describes a non-technical kind of password theft that relies on people's willingness to help strangers who are in trouble.
What is it?

9. This kind of malware (Bagle, for example) relies on the recipient's willingness to open a password-protected attachment that has been received in an e-mail.
What is it?

10. This direct observation technique is one of the easiest ways to fraudulently obtain passwords.
What is it?

This was last updated in August 2008
Posted by: Margaret Rouse

Related Terms


  • going dark

    - The going dark problem, as described by the FBI, is the Bureau’s inability to access legally intercepted communications and information because of the encryption technologies used for data privacy ... (

  • threat actor

    - A threat actor is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- the security of an organization. (

  • threat intelligence service (TI service)

    - A threat intelligence service (TI service) is a provider of information about current or emerging threats that could negatively impact the security of a customer’s organization. (


  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

  • Internet applications

    - This glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Passwords: Do you speak geek?Powered by

Get answers from your peers on your most technical challenges

Tech TalkComment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.