Communications from beyond

Test your knowledge of VoIP and other communication technologies with our spooky quiz.

How many of these 13 questions can you answer without peeking? Test your knowledge -- or your psychic powers -- with our quiz.

1. This is an element through which a message is communicated, such as optical fiber or the person leading a seance.

Answer

2. ESP is the "sixth sense," which might allow you to communicate with the dead, read minds or foresee the future. Read our minds: With what security framework is ESP associated?

Answer

3. When you think of projectile purging, horror film classic "The Exorcist" comes to mind. This form of purging also happens to be the name of a Unix software utility commonly associated with VoIP eavesdropping attacks. What is it?

Answer

4. While it sounds like a doorway for communicating with an alternate dimension, in telecommunications this is a Web site or other service that a user can reach by telephone for information like weather, sport scores or stock quotes. What is it?

Answer

5. A spooky encounter (or too much coffee) might cause this phenomenon in an individual. In VoIP, it's more than annoying than scary, where it describes a variation in the time between packets arriving caused by network congestion.

Answer

6. This disembodied spirit doesn't go bump in the night. Instead, it haunts Internet Relay Chat (IRC) servers as a vacated user session that the server believes is still active. What is it?

Answer

7. Hearing your voice do this is a dark cave could be creepy. Having it happen on your VoIP call is more frustating than scary. What is it -- and why might it happen?

Answer

8. Those possessed of strange occult powers (and fans of author Robert Anton Wilson) may be able to see these in the margins and blank spaces of magazines and newspapers.

Answer

9. You might see "RIP" on a gravestone, but your network depends on it for managing router information within a corporate LAN. What does RIP stand for?

Answer

10. To enter Hades, you have to pass this three-headed dog, the namesake of this secure method for authenticating a request for a service in a computer network. What is it?

Answer

11. Quoth the raven, "nevermore." That famous poem's author may remind you of the technology that allows electrical current to be carried by data cables to devices such as VoIP phones and surveillance cameras. What is it?

Answer

12. You might sense an eerie one while touring a haunted lighthouse. In IT, this is a type of application makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network. What is it?

Answer

13. Calls from beyond the grave? This spooky phenomenon happens when your computer attempts to make a connection automatically.

Answer

How many did you answer correctly? Drop us a line (by email! We're not psychic!) and let us know.

  • Want more Halloween/IT trivia? You'll find plenty of tricks and treats in Whatis.com's Vault of Tech Terror.

  • This was first published in October 2006
    This Content Component encountered an error

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchMobileComputing

    SearchNetworking

    SearchTelecom

    SearchITChannel

    SearchEnterpriseWAN

    SearchExchange

    Close