Encryption Strength is based on
A) strength of algorithm
B) secrecy of key
C) length of key
D) all of the above
Correct Answer:
Verified
Q7: Interception is an attack on
A)availability
B)confidentiality
C)integrity
D)authenticity
Q8: Chosen cipher text attack is based on
A)cryptanalysis
B)cryptography
C)encryption
D)decryption
Q9: The process of writing the text as
Q10: Biometric authentication works on the basis of
A)human
Q11: Which layer filters the proxy firewall?
A)application
B)network
C)transport
D)none of
Q13: GCD(a,b) = GCD(b,a mod b)
A)true
B)false
C)cannot be determined
D)none
Q14: All groups satisfy properties
A)g-i to g-v
B)g-i to
Q15: An Abelian Group satisfies the properties
A)g-i to
Q16: A Ring satisfies the properties
A)r-i to r-v
B)g-i
Q17: A Ring is said to be commutative
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents