Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
If the sender and receiver use different keys, the system is referred to as conventional cipher system
Networks
2022-06-01
Answers
30
Question
40
Followers
30
1
1
1123
In brute force attack, on average half of all possible keys must be tried to achieve success
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1126
Which is the principle of the encryption using a key?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
439
Which is the largest disadvantage of the symmetric Encryption?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
434
Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
676
Which of the following requires no password travel across the internet ?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
420
Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it ?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
456
Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
425
In which of the following encryption key is used to encrypt and decrypt the data ?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
416
Which of the following is not a property of good encryption technique ?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
461
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
380
___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
416
An electronic document that establishes your credentials when you are performing transactions
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
420
Total:
11022
Previous
587
588
589
590
591
Next
Go