Multiple Choice
The use of text in a book as the algorithm to decrypt a message is known as the ____ cipher.
A) substitution
B) transposition
C) running key
D) Vernam
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q90: Symmetric encryptions are more efficient in their
Q91: Which of the following biometric authentication systems
Q92: A _ is NOT an example of
Q93: _ is NOT a packet header component
Q94: Access control encompasses four processes beginning with
Q96: IPSec provides support for all uses within
Q97: In cryptology,an original message is in a
Q98: Kerberos uses asymmetric key encryption to validate
Q99: _ was developed by Netscape in 1994
Q100: Many organizations don't even realize they have