This document contains questions from a quiz about network security topics. It asks about the location of the Windows password file, what makes Kerberos more secure than other authentication schemes, characteristics that make LM hashes vulnerable to offline attacks, types of password attacks, Windows utilities that can enumerate hosts, tools for discovering and fixing security holes, what SNMP uses to define system information, MIB files containing server service information, hidden Windows shares that can indicate null session vulnerabilities, NTP enumeration commands, why SNMP is a target for hackers, SMTP protocol commands, and a tool that identifies TCP/IP connection protocol statistics using NBT.