Multiple Choice
Encryption has a remarkably long and varied history.The invention of writing was apparently soon followed by a desire to conceal messages.One of the methods,was the simple substitution of numbers for letters,for example A = 1,B = 2,etc.This is an example of
A) a hashing algorithm.
B) symmetric key encryption.
C) asymmetric key encryption.
D) a public key.
Correct Answer:

Verified
Correct Answer:
Verified
Q2: Identify the last step in protecting the
Q3: Data masking is also referred to as<br>A)encryption.<br>B)tokenization.<br>C)captcha.<br>D)cookies.
Q4: If an organization asks you to disclose
Q5: Identify the first step in protecting the
Q6: Which type of software blocks outgoing messages
Q8: Describe symmetric encryption and identify three limitations.
Q9: Which of the following is not one
Q10: Identify the type of information below that
Q11: Identify one weakness of encryption below.<br>A)Encrypted packets
Q12: Which of the following is not true