Similar Collections


.

questions

Title
A malicious code hidden inside a seemingly harmless piece of code
Attack in which a user creates a packet that appears to be something else
A technique in which a program attacks a network by exploiting IP broadcast addressing operations
An attack in which the user receives unwanted amount of e-mails
These ciphers replace a character or characters with a different character or characters, based on some key
Encryption is the study of creating and using decryption techniques
A type of cipher that uses multiple alphabetic strings
An encryption technique with 2 keys is ______________
In public key cryptography, a key that decrypts the message
DES stands for?
Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption
Triple-DES has ______ keys
Encryption standard that is selected by the US government to replace DES
An electronic document that establishes your credentials when you are performing transactions
___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
Which of the following is not a property of good encryption technique ?
In which of the following encryption key is used to encrypt and decrypt the data ?
Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________
Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it ?
total questions: 104

Questions

104

Views

985

Best Answers

299

Points

5