Q: A cipher in which the order is not preserved.
Solution: In transposition-based cipher, the order of the plain text is not preserved. They can be very simple to identify.
Q: Plain text is the data after encryption is performed.
Solution: The statement is false. Cipher is the algorithm used in encryption. Ciphertext is the data after encryption is performed.
Q: A unique piece of information that is used in encryption.
Solution: The key is the unique piece of information. It is used to create the cipher text and decrypt it back.
Q: Study of creating a d using encryption and decryption techniques.
Solution: It is called as cryptography. It is the study of creating and using the encryption techniques.
Q: The process of transforming plain text into unreadable text.
Solution: Encryption is the process of transforming readable text i.e. plain text to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
Q: An algorithm used in encryption is referred to as cipher.
Solution: The statement is true. Cipher is the algorithm used in encryption. Encryption is making readable text as unreadable to keep it secured.
Q: A process of making the encrypted text readable again.
Solution: The reverse process is called decryption. It is the process of making the information readable again.
Q: Attack in which a user creates a packet that appears to be something else.
Solution: The attack is a spoofing attack. It is when a user creates a packet that appears to be something else or from someone else.
Q: A technique in which a program attacks a network by exploiting IP broadcast addressing operations.
Solution: Smurfing is a technique in which a program attacks a network by exploiting IP broadcast addressing operations.
Q: An attack in which the user receives unwanted amount of e-mails.
Solution: In the case of denial of e-mail bombing, a user sends an excessive amount of unwanted e-mail to someone.
You Have Score    | /10 |