Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
If the sender and receiver use different keys, the system is referred to as conventional cipher system
Networks
2022-06-01
Answers
30
Question
40
Followers
30
1
1
1179
In brute force attack, on average half of all possible keys must be tried to achieve success
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1164
Which is the principle of the encryption using a key?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
481
Which is the largest disadvantage of the symmetric Encryption?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
500
Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
734
Which of the following requires no password travel across the internet ?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
468
Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it ?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
498
Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
461
In which of the following encryption key is used to encrypt and decrypt the data ?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
464
Which of the following is not a property of good encryption technique ?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
501
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
423
___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
446
An electronic document that establishes your credentials when you are performing transactions
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
460
Total:
11022
Previous
587
588
589
590
591
Next
Go