What is symmetric encryption?
The other name for public key encryption.
What is asymmetric encryption?
What are the rules which computers follow to accomplish authentication?
What are authentication protocols?
The name of the group who created the OSI Model.
What is ISO?
The network class which has the range 128-192.
What is class B?
The other name for Public Key encryption.
What is asymmetric encryption?
The term used to describe the deeply connected private and public key which any person or device may generate.
What is key-pair?
Authentication protocol which encrypts usernames and passwords AND requires a 3-way handshake to complete the authentication process.
What is CHAP/MS-CHAP?
The name of the layer where routing occurs.
What is layer 3?
The purpose of the reserved address 127.0.0.1.
The private key encryption scheme which weaves a 56-bit key once.
What is DES (Data Encryption Standard)?
The name of the first ever Public Key algorithm which was named after it's inventors.
What is Diffie-Helman?
The authentication protocol which applies communication with a particular port e.g a physical switch port.
What is 802.1x (EAPOL)?
The meaning of n in the formula 2 ^ n = Y
What is the number of bits to be borrowed?
The private key encryption scheme which weaves keys of length 128-bit, 160-bit, 192-bit or 256-bit.
What is AES (Advanced Encryption Standard)?
The name of the most popular Public Key algorithm which was named after it's inventors.
What is Kerberos?
What is the transport layer?
The meaning of Y in the formula 2 ^ n = Y
What is the number of subnets created?
What is cyphertext?
The name of the algorithm which is sometimes used along with the most popular public key scheme.
RC4
Service used in environments in which many simultaneous dial-up connections must be supported.
What is RADIUS (Remote Authentication Dial-In User Service)?
The layer where encryption and compression occur.
What is the presentation layer?
What is 255.0.0.0?