Browse Definitions :
Reference

Security Quizzes

We've gathered a collection of our quizzes on security-related topics. You'll find quizzes about security management, threats and vulnerabilities, viruses and other malware and more. Want to study up first? See below, our security-related learning guides and tutorials and our larger collection of resources.

Need more basic information before you get started? See our definitions for application security, malware and authentication.

 

Security Quizzes:

  • Authentication Methods -- This quiz will test your knowledge of the authentication measures protecting your network's resources.

  • Building a Risk-based Compliance Program -- Evaluate your grasp of risk-based compliance basics.

  • Common Vulnerabilities -- Test your knowledge of various vulnerabilities and the attacks targeting them.

  • Cryptography -- OK, boys and girls! Do you have your secret decoder handy? Evaluate your knowledge of cryptography with this quiz.

  • Encryption algorithms -- Take this quiz to find out how much you know about encryption algorithms.

  • Firewalls -- This quiz will test your knowledge of firewall basics.

  • Identity and Access Management Architecture -- How much do you know about identity and access management? Take this quiz to find out.

  • iSeries security -- Fact or Fiction? -- Test your knowledge against security expert Carol Woodbury's answers to iSeries security questions.

  • Nasties in the News -- How much do you know about the various malware threatening Web security? Test your knowledge with this quiz.

  • Online threats to privacy -- Take this quiz to see if you really have a grasp of the entities after your sensitive information.

  • Passwords -- This quiz features 10 essential password-related terms.

  • Securing Your Network -- Evaluate your grasp of essential information for protecting your network.

  • Security Awareness for End Users -- Your network's biggest threat may be end users. See if you know how to keep them from endangering network security.

  • Security Attacks -- This quiz tests your knowledge of some common attack methods and preventative measures.

  • Web Attack Prevention -- This quiz from Web Security School tests your understanding of protecting systems from intruders online.

  • Web Security School -- Did you ace the above? Take this Web Security final exam to see how much you really know about Web attack protection and defense.

  • Summer Security: Are you ready to go on vacation? -- Ready to go? Take this quiz to see if your network will be sufficiently protected in your absence.

  • Vulnerability Management -- Test your knowledge of vulnerability assessments and penetration tests.

  • What are the Top 10 consumer threats to the enterprise? -- Every admin should know about these consumer-driven threats.

 

Would you like to test your knowledge of other IT topics? See our huge collection of quizzes.

Want more security-specific info? See our security learning guides and tutorials, all our security-related definitions or the resources on SearchSecurity.com.

We've got lots more information for you! Check out the full collection of Learning Guides and Tutorials to learn essential information on a wide range of subjects. You'll find guides and tutorials about networking, storage and storage management, backup and recovery, and a wide range of other topics, including databases, business intelligence, programming and much more. Also see: Our Favorite Cheat Sheets

This was last updated in June 2010

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close