Exam 21: Cryptography and Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A ____ is visible or invisible information added to an image,video,or audio that identifies the copyright owner of the media.

(Multiple Choice)
4.8/5
(33)

Describe asymmetric encryption.

(Essay)
4.8/5
(33)

____ ciphers encrypt any number of bits

(Multiple Choice)
4.8/5
(32)

In ____ encryption,the single key must be shared between the individuals wishing to protect their data.

(Multiple Choice)
4.9/5
(25)

In ____ encryption,the private key is kept private,in the hands of a single individual.

(Multiple Choice)
4.9/5
(27)

Keeping secrets has become a major force in networking and communication.

(True/False)
4.8/5
(35)

The hash value is called a ____.

(Multiple Choice)
4.8/5
(41)

What is a frequency analysis?

(Essay)
4.8/5
(34)

In the ____ cipher technique,the letters of the alphabet are shifted one or more positions to obtain the encryption alphabet.

(Multiple Choice)
5.0/5
(25)

Match each item with a statement below. -A single key is used to encrypt and decrypt the data

(Multiple Choice)
4.7/5
(35)
Showing 21 - 30 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)