adplus-dvertising
frame-decoration

Question

_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

a.

Malware Analysis

b.

Exploit writing

c.

Reverse engineering

d.

Cryptography

Posted under Cyber Security

Answer: (d).Cryptography

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

Similar Questions

Discover Related MCQs

Q. ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

Q. When plain text is converted to unreadable format, it is termed as _____________

Q. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

Q. Cryptography can be divided into ______ types.

Q. Data which is easily readable & understandable without any special algorithm or method is called _________________

Q. Plain text are also called _____________

Q. There are ________ types of cryptographic techniques used in general.

Q. Conventional cryptography is also known as _____________ or symmetric-key encryption.

Q. Data Encryption Standard is an example of a _____________ cryptosystem.

Q. _______________ cryptography deals with traditional characters, i.e., letters & digits directly.

Q. ____________ cryptography operates on binary-bit series and strings.

Q. __________ cryptography has always been focussing on the concept of ‘security through obscurity’.

Q. ________________ cryptography is based on publicly known mathematically designed algorithms to encrypt the information.

Q. _____________________ is the art & science of cracking the cipher-text without knowing the key.

Q. The process of disguising plaintext in such a way that its substance gets hidden (into what is known as cipher-text) is called _________________

Q. The method of reverting the encrypted text which is known as cipher text to its original form i.e. plain text is known as ________________

Q. Which of the following is not the primary objective of cryptography?

Q. Cryptography offers a set of required security services. Which of the following is not among that 4 required security services?

Q. A cryptosystem is also termed as ______________

Q. ______________ is the mathematical procedure or algorithm which produces a cipher-text for any specified plaintext.