The protocol that your browser uses to access an HTML web page.
What is Hypertext Transfer Protocol (HTTP)?
The number of bits in 1 byte
What is 8 bits?
One-key encryption
What is symmetric encryption?
A logic gate that has to have both inputs be true for the output to be true.
What is AND?
Translates domain names to IP addresses.
What is DNS?
Ensures that all packets of a data stream are transmitted and received exactly as originally sent.
What is Transmission Control Protocol (TCP)?
The maximum number of bits in binary needed to represent one hexadecimal character?
What is 4 bits?
Bob wants to send Alice an encrypted message using public key cryptography. What does he need from Alice in order to encrypt and send her a message?
What is Alice's public key?
x = true, y = false
NOT (x OR y)
What is false?
Uses a network of remote servers hosted on the Internet to store, manage, and process data.
What is cloud computing?
These local protocols are the least abstract because they deal directly with your physical hardware.
What is Network/Link Layer Protocols?
The number of bits needed to represent the decimal number 256 in binary.
What is 9 bits?
True or False: Eve is watching the communication between Alice and Bob and retrieves the encrypted message Bob has sent to Alice. She also has Alice's public key. Eve can read the message.
What is false? (The encrypted message can only be decrypted by Alice's private key.)
x = false, y = true
(x AND y) AND (x OR y)
What is false?
The minimum number of bits you would need to represent a number on a 0 to 10 scale.
What is 4?
The protocol for email transmission.
What is Simple Mail Transfer Protocol (SMTP)?
The highest number you can represent with 5 bits.
What is 31?
This verifies the ownership of public keys used in secure communication.
What is a digital certificate? (Verified by a Certificate Authority)
The value of x for this expression to be true.
( (5 > 5) OR x) AND (x OR (3 < 2))
What is true?
Line 1: x ← RANDOM(1, 5)
The chance that this code will result in an even number (percent).
What is 40%?
Routers use these protocols to detect and work around network congestion.
What is Internet Layer Protocols?
The order from least to greatest: gigabyte, kilobyte, terabyte, megabyte
What is: megabyte, kilobyte, gigabyte, terabyte
An attack that is characterized by communication from one person trying to trick another person into divulging personal information.
What is phishing?
x = true, y = true
( x AND (5 > 2) ) OR ( y AND (3 > 1) )
What is true?
48 mod 9
What is 3?