Network
Internet
Cryptography
Cybersecurity
100

What is the difference between Bandwidth and Latency?

Bandwidth is the rate of download and upload while Latency is the amount of time something takes to reach its destination

100

How is IPv4 different from IPv6?

IPv6 has many more IP address combinations as it uses a 128-bit address rather than a 32-bit address used in IPv4

100

What is the difference between symmetric keys and assymmetric keys?

Symmetric keys use a single key to encrypt and decrypt while asymmetric keys use a private key and a public key.

100

What is 2FA?

Two Factor Autentication is a password method that asks for an additional authentication in addition to the password.

200

What is a client and server?

A client is a computer or software application that requests services from a server located on the internet. A server is a host that provides some kind of service such as Google or Microsoft.

200

Who provides your IP Address?

IP addresses are provided by your Service provider.

200

How do you decrypt most of the Ciphers?

Frequency analysis

200

What are biometrics?

Biometrics are things such as face recognition, and fingerprint. These things use your physical features for authentication.

300

Why is having a decentralized network better than a centralized network?

Because if the main router gets destroyed in a centralized network, then data can no longer be transferred but with a decentralized network, even when a router goes down, data can take a different path to be transferred.

300

How many levels of DNS is there?

4 levels

300

What are the 3 types of ciphers learned in CSP?

Caeser Cipher, Random Substitution, Vigenére Cipher.

300

What is malware?

Malware is an installed software intended to damage a computing system or take partial control over its operation.

400

What does the World Wide Web get run on?

HTTP

400

This thing sends a message to request the IP address

DNS

400

What is a One-Time-Pad?

One time pad is an unbreakable cipher, this is achieved by using a random polyalphabetic key that is as long as the message itself.

400

What is phishing?

Phishing is a technique hackers use to trick a user into providing personal information usually through email.

500

The gap between those who have access to the Internet and computers and those who do not.

Digital Divide

500

What thing directs data packets to the right location?

Routers

500

This is a substitution system multiple alphabets are used to encrypt a single message.

polyalphabetic substitution

500

What do firewalls do? 

Firewalls are barriers that protect a network from unauthorized access