IT Security: Defense against the digital dark arts Week 2 Questions and Answers Already Passed
IT Security: Defense against the digital dark arts Week 2 Questions and Answers Already Passed Plaintext is the original message, while _____ is the encrypted message. Cyphertext The specific function of converting plaintext into ciphertext is called a(n) ______. x***** permutation Encryption algorithm Studying how often letters and pairs of letters occur in a language is referred to as _______. frequency analysis True or false: The same plaintext encrypted using the same algorithm and same encryption key would result in different ciphertext outputs. false The practice of hiding messages instead of encoding them is referred to as ______. Steganography ROT13 and a Caesar cipher are examples of _______. substitution cipher DES, RC4, and AES are examples of ______ encryption algorithms. symmetric What are the two components of an asymmetric encryption system, necessary for encryption and decryption operations? Check all that apply. Public Key and Private key
Written for
- Institution
- IT SECURITY
- Course
- IT SECURITY
Document information
- Uploaded on
- April 15, 2024
- Number of pages
- 3
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
it security defense against the digital dark arts
Also available in package deal