adplus-dvertising
frame-decoration

Question

Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?

a.

Monoalphabetic

b.

Polyalphabetic

c.

Transpositional

d.

None of the above

Answer: (b).Polyalphabetic

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one-to-many?

Similar Questions

Discover Related MCQs

Q. What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?

Q. The ................ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.

Q. The count-to-infinity problem is associated with

Q. Suppose a file of 10,000 characters is to be sent over a line at 2400 bps. Assume that the data is sent in frames. Each frame consists of 1000 characters and an overhead of 48 bits per frame. Using synchronous transmission, the total overhead time is ..............

Q. Which of the following is the size of Network bits and Host bits of Class A of IP address?

Q. Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged ?

Q. Which of the following is a bit rate of an 8-PSK signal having 2500 Hz bandwidth ?

Q. Match the following :

(a) UDP             (i) Message Transfer Protocol
(b) OSPF           (ii) Bit-oriented Protocol
(c) SMTP           (iii) Interior Gateway Routing Protocol
(d) HDLC           (iv) Connectionless Transport Protocol

Codes :
      (a)   (b)  (c)  (d)

Q. Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224. What is the subnet address ?

Q. If the data unit is 111111 and the divisor is 1010. In CRC method, what is the dividend at the transmission before division ?

Q. If user A wants to send an encrypted message to user B. The plain text of A is encrypted with the .................

Q. A ............... can forward or block packets based on the information in the network layer and transport layer header.

Q. Which of the following addresses is used to deliver a message to the correct application program running on a host?

Q. In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.

Q. In classful addressing, the IP address 190.255.254.254 belongs to

Q. In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three layer hierarchy?

Q. In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to.

Q. Using data p=3, q=11, n=pq, d=7  in RSA algorithm find the cipher text of the given plain text SUZANNE

Q. A data file of 1,00,000 characters contains only the characters g-l, with the frequencies as indicated in table. Using the variable-length code by Huffman codes, the file can be encoded with

Q. In a fully connected mesh network with n devices, there are ................ physical channels to link all devices.