The process of writing the text as rows and read it as columns is known as
A) vernam cipher
B) ceaser cipher
C) transposition columnar cipher
D) homophonic substitution cipher
Correct Answer:
Verified
Q4: Public key encryption is advantageous over Symmetric
Q5: The sub key length at each round
Q6: Which one is the strong attack mechanism?
A)chosen
Q7: Interception is an attack on
A)availability
B)confidentiality
C)integrity
D)authenticity
Q8: Chosen cipher text attack is based on
A)cryptanalysis
B)cryptography
C)encryption
D)decryption
Q10: Biometric authentication works on the basis of
A)human
Q11: Which layer filters the proxy firewall?
A)application
B)network
C)transport
D)none of
Q12: Encryption Strength is based on
A)strength of algorithm
B)secrecy
Q13: GCD(a,b) = GCD(b,a mod b)
A)true
B)false
C)cannot be determined
D)none
Q14: All groups satisfy properties
A)g-i to g-v
B)g-i to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents