Question
a.
Decryption
b.
Encryption
c.
Network Security
d.
Information Hiding
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The process of transforming plain text to unreadable text.
Similar Questions
Discover Related MCQs
Q. An algorithm used in encryption is referred to as cipher.
View solution
Q. A process of making the encrypted text readable again.
View solution
Q. WTLS stands for?
View solution
Q. The protocol designed to make the security of wireless LAN as good as that of wired LAN.
View solution
Q. A person who enjoys learning details about computers and how to enhance their capabilities.
View solution
Q. A program created by Farmer and Venema for auditing capability.
View solution
Q. A small program that changes the way a computer operates.
View solution
Q. A program that copies itself.
View solution
Q. An attack in which the site is not capable of answering valid request.
View solution
Q. A cipher in which the order is not preserved.
View solution
Q. Plain text is the data after encryption is performed.
View solution
Q. A unique piece of information that is used in encryption.
View solution
Q. Study of creating a d using encryption and decryption techniques.
View solution
Q. Creating a computer or paper audit that can help detect wrong doings.
View solution
Q. An indirect form of surveillance.
View solution
Q. A malicious code hidden inside a seemingly harmless piece of code.
View solution
Q. Attack in which a user creates a packet that appears to be something else.
View solution
Q. A technique in which a program attacks a network by exploiting IP broadcast addressing operations.
View solution
Q. An attack in which the user receives unwanted amount of e-mails.
View solution
Q. These ciphers replace a character or characters with a different character or characters, based on some key.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!