Private Key
Public Key
Authentication
OSI Model
IP Addresses/Subnetting
100
The other name for Private Key encryption.

What is symmetric encryption?

100

The other name for public key encryption.

What is asymmetric encryption?

100

What are the rules which computers follow to accomplish authentication?

What are authentication protocols?

100

The name of the group who created the OSI Model.

What is ISO?

100

The network class which has the range 128-192.

What is class B?

200

The other name for Public Key encryption.

What is asymmetric encryption?

200

The term used to describe the deeply connected private and public key which any person or device may generate.

What is key-pair?

200

Authentication protocol which encrypts usernames and passwords AND requires a 3-way handshake to complete the authentication process.

What is CHAP/MS-CHAP?

200

The name of the layer where routing occurs.

What is layer 3?

200

The purpose of the reserved address 127.0.0.1.

What is loopback testing?
300

The private key encryption scheme which weaves a 56-bit key once.

What is DES (Data Encryption Standard)?

300

The name of the first ever Public Key algorithm which was named after it's inventors.

What is Diffie-Helman?

300

The authentication protocol which applies communication with a particular port e.g a physical switch port.

What is 802.1x (EAPOL)?

300
The only layer which is divided into two sub-layers.
What is the data-link layer?
300

The meaning of n in the formula 2 ^ n = Y

What is the number of bits to be borrowed?

400

The private key encryption scheme which weaves keys of length 128-bit, 160-bit, 192-bit or 256-bit.

What is AES (Advanced Encryption Standard)?

400

The name of the most popular Public Key algorithm which was named after it's inventors.

What is RSA?
400
Authenticated protocol named after 3-headed dog of greek mythology.

What is Kerberos?

400
The  layer where protocols are either connection-oriented or connectionless.

What is the transport layer?

400

The meaning of Y in the formula 2 ^ n = Y

What is the number of subnets created?

500
The name of the gibberish produced by ecrypting a message.

What is cyphertext?

500

The name of the algorithm which is sometimes used along with the most popular public key scheme.

RC4

500

Service used in environments in which many simultaneous dial-up connections must be supported.

What is RADIUS (Remote Authentication Dial-In User Service)?

500

The layer where encryption and compression occur.

What is the presentation layer?

500
The default subnet mask for a class A network.

What is 255.0.0.0?

M
e
n
u