Computer Networking
Computer Science
Cloud
Network Security
Random
100

This VLAN ID is never used for normal data traffic and is reserved for administrative purposes

VLAN 1

100

This sorting algorithm repeatedly selects the smallest element and places it in order.


Selection Sort

100

This type of virtualization allows multiple applications to run in isolated environments on the same OS kernel.

Containerization 

100

This encryption algorithm is widely used for securing web traffic and is the successor to SSL.

TLS

100

This law states that computing power doubles approximately every two years.

Moore's Law

200

When data uses a dedicated path from Sender to the Recipient

Circuit Switching

200

This data structure supports O(1) time complexity for insertion, deletion, and access on average.

Hash Table

200

This technique dynamically allocates cloud resources based on demand to optimize performance and cost.

Auto-scaling
200

This attack involves intercepting and altering communication between two parties without their knowledge

Man-in-the-middle attack

200

This paradox in quantum mechanics suggests that an observer’s knowledge affects a system’s outcome.

Schrödinger’s Cat

300

This command-line packet analyzer, available only on Unix-like systems, allows users to capture and inspect network traffic in real time using filters based on protocols, IPs, and ports.

TCPDUMP

300

The programming language known for its “write once, run anywhere” capability

Java

300

This cloud security principle ensures that only authorized users can access and modify data.

Principle of least privilege

300

This type of attack involves an attacker disguising their MAC address to impersonate another device on a local network

MAC Spoofing

300

This was the first Pixar movie ever released.

Toy Story

400

This STP enhancement allows a port to immediately enter the forwarding state if it is connected to an end device.

PortFast

400

Kleene’s Theorem states that this type of language can be represented by both a regular expression and a finite automaton.

Regular Language 

400

This cloud networking strategy minimizes latency by processing data closer to the user rather than in a central data center.

Edge Computing

400

This cryptographic hash function, producing a 160-bit output, was widely used in security protocols before being considered weak.


SHA-1

400

This country has the most time zones, including overseas territories.

France

500

This algorithm, used in CSMA/CD, determines the delay before retransmitting a packet after a collision, doubling the wait time with each failure to reduce further collisions.

Binary Exponential Backoff (BEB)

500

This programming concept allows an object to take multiple forms based on its context.


Polymorphism

500

This cloud service component acts as a reverse proxy and distributes traffic across multiple instances

Load Balancer

500

This standardized format is used to store and share HTTPS certificates.

x.509

500

This number is the only one that is equal to the sum of the cubes of its digits.

153

M
e
n
u