Multiple Choice
What is the 4th step in DES Algorithm?
A) key transformation
B) s-box substitution
C) p-box permutation
D) expansion permutation
Correct Answer:

Verified
Correct Answer:
Verified
Q12: Symmetric key encryption is also called as?<br>A)public
Q13: In Symmetric schemes requires both parties to
Q14: AES stands for ?<br>A)authorized encryption standard<br>B)advance encryption
Q15: _is used to create the organisation's overall
Q16: An attempt to harm, damage or cause
Q18: Compromising confidential information comes under _<br>A)bug<br>B)threat<br>C)vulnerability<br>D)attack
Q19: What is full form of DDoS?<br>A)derived denial
Q20: The full form of OSI is OSI
Q21: Conversion of Cypher text to plain text?<br>A)encryption<br>B)decryption<br>C)simple
Q22: An act of protecting information from unauthorised