Multiple Choice
Shift cipher is sometimes referred to as the
A) Caesar cipher
B) Shift cipher
C) cipher
D) cipher text
Correct Answer:

Verified
Correct Answer:
Verified
Q4: A(n) _ can be used to preserve
Q5: Transmission control protocol is<br>A)connection oriented protocol<br>B)uses a
Q6: Application layer protocol defines<br>A)types of messages exchanged<br>B)message
Q7: User datagram protocol is called connectionless because<br>A)all
Q8: An asymmetric-key (or public-key) cipher uses<br>A)1 Key<br>B)2
Q10: Man-in-the-middle attack can endanger security of Diffie-Hellman
Q11: Which one of the following is an
Q12: Transport layer aggregates data from different applications
Q13: Heart of Data Encryption Standard (DES), is
Q14: A hash function must meet _ criteria.<br>A)two<br>B)three<br>C)four<br>D)none