Multiple Choice
John is creating an encryption by replacing every third letter of the alphabet by the fifth letter to its left. Sally, an expert at encryption, immediately notices the pattern and suggests for John to use random values. What would John use to do this?
A) Randomization
B) Initialization Vectors
C) Mapping
D) Isolation
Correct Answer:

Verified
Correct Answer:
Verified
Q31: I want to find out the correlations
Q32: S. Department of Defense developed the Trusted
Q33: Environmental risks are always at hand and
Q34: In Peggy's office, all users have a
Q35: Darrell and Ken are in an argument.
Q37: What type of access control uses a
Q38: Cryptography is really an issue of mathematics
Q39: Databases are built with programming languages. Which
Q40: What type of security model separates data
Q41: Peter has been hired by XYZ Corp.