Browse Definitions :

Security Quizzes

We've gathered a collection of our quizzes on security-related topics. You'll find quizzes about security management, threats and vulnerabilities, viruses and other malware and more. Want to study up first? See below, our security-related learning guides and tutorials and our larger collection of resources.

Need more basic information before you get started? See our definitions for application security, malware and authentication.


Security Quizzes:

  • Authentication Methods -- This quiz will test your knowledge of the authentication measures protecting your network's resources.

  • Building a Risk-based Compliance Program -- Evaluate your grasp of risk-based compliance basics.

  • Common Vulnerabilities -- Test your knowledge of various vulnerabilities and the attacks targeting them.

  • Cryptography -- OK, boys and girls! Do you have your secret decoder handy? Evaluate your knowledge of cryptography with this quiz.

  • Encryption algorithms -- Take this quiz to find out how much you know about encryption algorithms.

  • Firewalls -- This quiz will test your knowledge of firewall basics.

  • Identity and Access Management Architecture -- How much do you know about identity and access management? Take this quiz to find out.

  • iSeries security -- Fact or Fiction? -- Test your knowledge against security expert Carol Woodbury's answers to iSeries security questions.

  • Nasties in the News -- How much do you know about the various malware threatening Web security? Test your knowledge with this quiz.

  • Online threats to privacy -- Take this quiz to see if you really have a grasp of the entities after your sensitive information.

  • Passwords -- This quiz features 10 essential password-related terms.

  • Securing Your Network -- Evaluate your grasp of essential information for protecting your network.

  • Security Awareness for End Users -- Your network's biggest threat may be end users. See if you know how to keep them from endangering network security.

  • Security Attacks -- This quiz tests your knowledge of some common attack methods and preventative measures.

  • Web Attack Prevention -- This quiz from Web Security School tests your understanding of protecting systems from intruders online.

  • Web Security School -- Did you ace the above? Take this Web Security final exam to see how much you really know about Web attack protection and defense.

  • Summer Security: Are you ready to go on vacation? -- Ready to go? Take this quiz to see if your network will be sufficiently protected in your absence.

  • Vulnerability Management -- Test your knowledge of vulnerability assessments and penetration tests.

  • What are the Top 10 consumer threats to the enterprise? -- Every admin should know about these consumer-driven threats.


Would you like to test your knowledge of other IT topics? See our huge collection of quizzes.

Want more security-specific info? See our security learning guides and tutorials, all our security-related definitions or the resources on

We've got lots more information for you! Check out the full collection of Learning Guides and Tutorials to learn essential information on a wide range of subjects. You'll find guides and tutorials about networking, storage and storage management, backup and recovery, and a wide range of other topics, including databases, business intelligence, programming and much more. Also see: Our Favorite Cheat Sheets

This was last updated in June 2010


  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...


  • denial-of-service attack

    A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to ...

  • information security (infosec)

    Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of ...

  • user authentication

    User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a...



  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...


  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...