Browse Definitions :
Reference

Security Quizzes

We've gathered a collection of our quizzes on security-related topics. You'll find quizzes about security management, threats and vulnerabilities, viruses and other malware and more. Want to study up first? See below, our security-related learning guides and tutorials and our larger collection of resources.

Need more basic information before you get started? See our definitions for application security, malware and authentication.

 

Security Quizzes:

  • Authentication Methods -- This quiz will test your knowledge of the authentication measures protecting your network's resources.

  • Building a Risk-based Compliance Program -- Evaluate your grasp of risk-based compliance basics.

  • Common Vulnerabilities -- Test your knowledge of various vulnerabilities and the attacks targeting them.

  • Cryptography -- OK, boys and girls! Do you have your secret decoder handy? Evaluate your knowledge of cryptography with this quiz.

  • Encryption algorithms -- Take this quiz to find out how much you know about encryption algorithms.

  • Firewalls -- This quiz will test your knowledge of firewall basics.

  • Identity and Access Management Architecture -- How much do you know about identity and access management? Take this quiz to find out.

  • iSeries security -- Fact or Fiction? -- Test your knowledge against security expert Carol Woodbury's answers to iSeries security questions.

  • Nasties in the News -- How much do you know about the various malware threatening Web security? Test your knowledge with this quiz.

  • Online threats to privacy -- Take this quiz to see if you really have a grasp of the entities after your sensitive information.

  • Passwords -- This quiz features 10 essential password-related terms.

  • Securing Your Network -- Evaluate your grasp of essential information for protecting your network.

  • Security Awareness for End Users -- Your network's biggest threat may be end users. See if you know how to keep them from endangering network security.

  • Security Attacks -- This quiz tests your knowledge of some common attack methods and preventative measures.

  • Web Attack Prevention -- This quiz from Web Security School tests your understanding of protecting systems from intruders online.

  • Web Security School -- Did you ace the above? Take this Web Security final exam to see how much you really know about Web attack protection and defense.

  • Summer Security: Are you ready to go on vacation? -- Ready to go? Take this quiz to see if your network will be sufficiently protected in your absence.

  • Vulnerability management -- Test your knowledge of vulnerability assessments and penetration tests.

  • What are the Top 10 consumer threats to the enterprise? -- Every admin should know about these consumer-driven threats.

 

Would you like to test your knowledge of other IT topics? See our huge collection of quizzes.

Want more security-specific info? See our security learning guides and tutorials, all our security-related definitions or the resources on SearchSecurity.com.

We've got lots more information for you! Check out the full collection of Learning Guides and Tutorials to learn essential information on a wide range of subjects. You'll find guides and tutorials about networking, storage and storage management, backup and recovery, and a wide range of other topics, including databases, business intelligence, programming and much more. Also see: Our Favorite Cheat Sheets

This was last updated in June 2010
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close