Review Test Submission_ITN_276_QUIZ4.docx - Review Test Submission Week 4 Quiz Question 1 2 out of 2 points Those methods where the same key is used to

Review Test Submission_ITN_276_QUIZ4.docx - Review Test...

This preview shows page 1 - 4 out of 10 pages.

Review Test Submission: Week 4- Quiz   Question 1 2 out of 2 points Those methods where the same key is used to encrypt and decrypt the plaintext is the definition of: Selected Answer: symmetric cryptography Answers: symmetric cryptography stream cipher Caesar cipher steganography Question 2 2 out of 2 points The type of medium used to hide data in steganography is referred to as the __________. This may be photos, video, sound files, or Voice over IP. Selected Answer: channel Answers: Kasiski examination asymmetric cryptography steganophony channel Question 3 2 out of 2 points
Image of page 1
__________is the process of analyzing a file or files for hidden content. Selected Answer: Steganalysis Answers: Steganalysis Asymmetric cryptography Symmetric cryptography Steganophony Question 4 2 out of 2 points What is meant by substitution? Selected Answer: in cryptography, the method of is changing some part of the plaintext for some matching part of ciphertext Answers: cryptography wherein two keys are used: one to encrypt the message and another to decrypt it a form of cryptography, which encrypts data in blocks; 64-bit blocks are quite common, although some algorithms (like AES) use larger blocks a form of cryptography that encrypts the data as a stream, one bit at a time in cryptography, the method of is changing some part of the plaintext for some matching part of ciphertext Question 5 2 out of 2 points What is meant by symmetric cryptography? Selected Answer: those methods where the same key is used to encrypt and decrypt the plaintext Answers: those methods where the same key is used to encrypt and decrypt the plaintext using one key to encrypt the message and another key to decrypt it
Image of page 2
the art and science of writing hidden messages the method of cryptography in which someone chooses a number by which to shift each letter of a text in the alphabet and substitute the new letter for the letter being encrypted Question 6 2 out of 2 points __________ is cryptography wherein two keys are used: one to encrypt the message and another to decrypt it.
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 10 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture