The Big Quiz On Computers

15 Questions | Total Attempts: 238

SettingsSettingsSettings
Please wait...
The Big Quiz On Computers

Test your Knowledge about Computers.


Questions and Answers
  • 1. 
    What term refers to a set of programs used to access and gain admin access to a system?
    • A. 

      Burglars Tools

    • B. 

      Router

    • C. 

      Rootkit

    • D. 

      Green Bag

  • 2. 
    In order to enhance security, TKIP encryption periodically changes what?
    • A. 

      The Encryption Key

    • B. 

      The Server Name

    • C. 

      The System Date

    • D. 

      The Checksum Algorithm

  • 3. 
    A May, 2009 release of a new version of which Google browser promised faster access?
    • A. 

      Chrome

    • B. 

      Laser

    • C. 

      GBrowse

    • D. 

      Neon

  • 4. 
    In VoIP, what term refers to the loss of speech-signal components, typically parts of words?
    • A. 

      Interference

    • B. 

      Slashing

    • C. 

      Hooking

    • D. 

      Clipping

  • 5. 
    What term refers to usually-public places for people to get wireless access to the Internet?
    • A. 

      Netspot

    • B. 

      Hotlink

    • C. 

      Hotspot

    • D. 

      Netgear

  • 6. 
    What term applies to the designation of traffic type for a connection, such as HTTP's 80?
    • A. 

      IP Address

    • B. 

      Message Code

    • C. 

      Connect String

    • D. 

      Port

  • 7. 
    2009 saw the release of what new smartphone from Palm?
    • A. 

      Pre

    • B. 

      PPhone

    • C. 

      Trius

    • D. 

      Xamin

  • 8. 
    When referred to in computer networking, what is "WLAN"?
    • A. 

      Warning Level Across Network

    • B. 

      Wireless Leased Area Node

    • C. 

      Wireless Local Area Network

    • D. 

      Wasted Leaps Across Nodes

  • 9. 
    What network feature is used to make emergency calls over VoIP?
    • A. 

      711 Supreme

    • B. 

      VoIP Alert

    • C. 

      Enhanced 911

    • D. 

      Mega 911

  • 10. 
    What term, borrowed from warfare, describes a partially secure network outside a firewall?
    • A. 

      DMZ

    • B. 

      Friendly Fire

    • C. 

      Green Zone

    • D. 

      ROI

  • 11. 
    What kind of packet filtering considers delivery conditions and context?
    • A. 

      Stateful

    • B. 

      Intelligent

    • C. 

      Generic

    • D. 

      Mobile

  • 12. 
    The RSA cryptography algorithm was invented by Ron Rivest, Adi Shamir and who else?
    • A. 

      Walter Erkis

    • B. 

      Bill Gates

    • C. 

      Leonard Adleman

    • D. 

      Roger Daltrey

  • 13. 
    Which three-key cryptographic algorithm is used by the U.S. to encrypt non-classified data?
    • A. 

      Triple-DES

    • B. 

      TRES

    • C. 

      SAS Trio

    • D. 

      3Com

  • 14. 
    In network security, what does the abbreviation "SSL" stand for?
    • A. 

      Secret Session Link

    • B. 

      Safe Session Logon

    • C. 

      Secure Sockets Layer

    • D. 

      Simple Security Limits

  • 15. 
    What type of message has a hidden message encoded within the obvious external message?
    • A. 

      Steganographic

    • B. 

      Algebraic

    • C. 

      Trigonometric

    • D. 

      Orwellian

Back to Top Back to top