Exam 1: Security Measures and Encryption Techniques for Information Protection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In DES step both LPT and RPT undergoes in how much key Rounds?

(Multiple Choice)
4.9/5
(33)

In AES in which Round Subkeys are Generated from Original key for each round?

(Multiple Choice)
4.8/5
(31)

The model is 7 layer architecture where each layer is having some specific functionality to perform.

(Multiple Choice)
4.8/5
(45)

The technique in which when one character is replaced by another Character is called as?

(Multiple Choice)
4.8/5
(37)

What is full form of DDoS?

(Multiple Choice)
4.8/5
(37)
Showing 21 - 25 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)