Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Guide to Network Security
Quiz 3: Cryptography
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -To encrypt, encode, or convert plaintext into the equivalent ciphertext
Question 22
Short Answer
In a(n) ____________________ attack, the attacker eavesdrops on the victim's session and uses statistical analysis of patterns and inter-keystroke timings to discern sensitive session information.
Question 23
Short Answer
Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -An encryption method or process encompassing the algorithm, key(s) and/or cryptovariable(s), and procedures used to perform encryption and decryption
Question 24
Short Answer
Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -To decrypt, decode, or convert ciphertext into the equivalent plaintext
Question 25
Short Answer
Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -The encoded message resulting from an encryption
Question 26
Short Answer
Match each item with a statement below. a.Algorithm f.Encipher b.Cryptosystem g.Steganography c.Cryptogram h.Substitution d.Code i.Transposition e.Decipher -The process of replacing plaintext values with other values to form ciphertext