Multiple Choice
The information that gets transformed in encryption is
A) plain text
B) parallel text
C) encrypted text
D) decrypted text
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Examples of User Policies is/are:<br>A)password policies<br>B)internet usage<br>C)system
Q2: Which of the following attack can actively
Q3: In layer, vulnerabilities are directly associated with
Q4: _ attack is when original data is modified
Q6: From the options below, which of them
Q7: Release of Message Content and Traffic analysis
Q8: The full form of OSI is OSI
Q9: _Policy ensures that the organization is maintaining
Q10: Compromising confidential information comes under _ <br>A)bug<br>B)threat<br>C)vulnerability<br>D)attack
Q11: When original data is changed to make