Chosen cipher text attack is based on
A) cryptanalysis
B) cryptography
C) encryption
D) decryption
Correct Answer:
Verified
Q3: . Rail Fence Technique is an example
Q4: Public key encryption is advantageous over Symmetric
Q5: The sub key length at each round
Q6: Which one is the strong attack mechanism?
A)chosen
Q7: Interception is an attack on
A)availability
B)confidentiality
C)integrity
D)authenticity
Q9: The process of writing the text as
Q10: Biometric authentication works on the basis of
A)human
Q11: Which layer filters the proxy firewall?
A)application
B)network
C)transport
D)none of
Q12: Encryption Strength is based on
A)strength of algorithm
B)secrecy
Q13: GCD(a,b) = GCD(b,a mod b)
A)true
B)false
C)cannot be determined
D)none
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents