Multiple Choice
Which of the following statements holds true for the term encryption?
A) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
B) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
C) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
D) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
E) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
Correct Answer:

Verified
Correct Answer:
Verified
Q23: What are some of the key managerial
Q24: Dumpster diving refers to physically trawling through
Q25: Regularly updated software lowers a system's vulnerable
Q26: Conforming to industry-standard guidelines and frameworks for
Q27: One of the major problems with the
Q29: Information security policies would be ineffective without
Q30: Describe some of the factors at work
Q31: Sifting through trash in an effort to
Q32: Cyber criminals who infiltrate systems and collect
Q33: In public-key encryption systems, the functions of