100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Incident Response Disaster Recovery (CGS2811) Question and answers 100% correct 2025

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
27-07-2025
Written in
2024/2025

Incident Response Disaster Recovery (CGS2811) Question and answers 100% correct 2025 __________is a term that refers to hiding messages in sound files. - correct answer Steganophony __________is the process of analyzing a file or files for hidden content. - correct answer Steganalysis __________is about obfuscating the message so that it cannot be read. - correct answer Cryptography The __________ cipher is a Hebrew code that substitutes the first letter of the alphabet for the last letter and the second letter for the second-to-last letter, and so forth. - correct answer Atbash The __________ cipher is the simplest single-alphabet substitution cipher. It is really just a permutation of the Caesar cipher. All characters are rotated 13 characters through the alphabet. - correct answer ROT13 The __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabet ciphers selected based on the letters of a keyword. - correct answer Vigenère In World War II, the

Show more Read less
Institution
Incident Response Disaster Recovery
Course
Incident Response Disaster Recovery









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Incident Response Disaster Recovery
Course
Incident Response Disaster Recovery

Document information

Uploaded on
July 27, 2025
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Incident Response Disaster Recovery
(CGS2811) Question and answers
100% correct 2025
__________is a term that refers to hiding messages in sound files. - correct
answer Steganophony


__________is the process of analyzing a file or files for hidden content. -
correct answer Steganalysis


__________is about obfuscating the message so that it cannot be read. -
correct answer Cryptography


The __________ cipher is a Hebrew code that substitutes the first letter of the
alphabet for the last letter and the second letter for the second-to-last letter,
and so forth. - correct answer Atbash


The __________ cipher is the simplest single-alphabet substitution cipher. It
is really just a permutation of the Caesar cipher. All characters are rotated 13
characters through the alphabet. - correct answer ROT13


The __________ cipher is a method of encrypting alphabetic text by using a
series of different monoalphabet ciphers selected based on the letters of a
keyword. - correct answer Vigenère


In World War II, the Germans made use of an electromechanical rotor-based
cipher system known as __________. - correct answer enigma

, The total number of possible keys for DES is _________, which a modern
computer system can break in a reasonable amount of time. - correct answer
256


__________ is cryptography wherein two keys are used: one to encrypt the
message and another to decrypt it. - correct answer asymmetric cryptography


__________ is perhaps the most widely used public key cryptography
algorithm in existence today. - correct answer RSA


What is meant by carrier? - correct answer Carrier is the signal, stream, or
data file in which the payload is hidden.


The type of medium used to hide data in steganography is referred to as the
__________. This may be photos, video, sound files, or Voice over IP. -
correct answer channel


What term is used to describe a method of using techniques other than brute
force to derive a cryptopgraphic key? - correct answer cryptanalysis


__________ describes the total number of coprime numbers; two numbers
are considered coprime if they have no common factors. - correct answer
Euler's Totient


Which of the following is the definition of Feistel function? - correct answer a
cryptographic function that splits blocks of data into two parts; one of the most
influential developments in symmetric block ciphers


What name is given to a method of attacking polyalphabetic substitution
ciphers? This method can be used to deduce the length of the keyword used
in a polyalphabetic substitution cipher. - correct answer Kasiski examination

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LEWISSHAWN55 Yale University
View profile
Follow You need to be logged in order to follow users or courses
Sold
87
Member since
2 year
Number of followers
46
Documents
7240
Last sold
1 month ago
THE SHOP FOR EXAMS,TESTBANKS,AQA, WHAT YOU STUDY AND WISH TO PASS THEN COME AND CHECK FOR YOUR NEED ......

WANT TO PASS YOUR EXAMS??? IF YES CHECK OUT MY ACCOUNT FOR ALL YOUR EXAMS NEED BE IT NURSING,REALTORS, HUMAN RESOURCE,MATHS,BIOLOGY,WGU,ICT, YOU BETTER CHECK MY ACCOUNT FOR MORE IF YOU GET WHAT U WANT THEN FEEL FREE TO PURCHASE AT A BETTER PRICE........

3.1

10 reviews

5
5
4
0
3
0
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions