Review Test Submission_ITN_276_QUIZ4.docx - Review Test Submission Week 4 Quiz Question 1 2 out of 2 points Those methods where the same key is used to

# Review Test Submission_ITN_276_QUIZ4.docx - Review Test...

This preview shows page 1 - 4 out of 10 pages.

Review Test Submission: Week 4- Quiz   Question 1 2 out of 2 points Those methods where the same key is used to encrypt and decrypt the plaintext is the definition of: Selected Answer: symmetric cryptography Answers: symmetric cryptography stream cipher Caesar cipher steganography Question 2 2 out of 2 points The type of medium used to hide data in steganography is referred to as the __________. This may be photos, video, sound files, or Voice over IP. Selected Answer: channel Answers: Kasiski examination asymmetric cryptography steganophony channel Question 3 2 out of 2 points
__________is the process of analyzing a file or files for hidden content. Selected Answer: Steganalysis Answers: Steganalysis Asymmetric cryptography Symmetric cryptography Steganophony Question 4 2 out of 2 points What is meant by substitution? Selected Answer: in cryptography, the method of is changing some part of the plaintext for some matching part of ciphertext Answers: cryptography wherein two keys are used: one to encrypt the message and another to decrypt it a form of cryptography, which encrypts data in blocks; 64-bit blocks are quite common, although some algorithms (like AES) use larger blocks a form of cryptography that encrypts the data as a stream, one bit at a time in cryptography, the method of is changing some part of the plaintext for some matching part of ciphertext Question 5 2 out of 2 points What is meant by symmetric cryptography? Selected Answer: those methods where the same key is used to encrypt and decrypt the plaintext Answers: those methods where the same key is used to encrypt and decrypt the plaintext using one key to encrypt the message and another key to decrypt it
the art and science of writing hidden messages the method of cryptography in which someone chooses a number by which to shift each letter of a text in the alphabet and substitute the new letter for the letter being encrypted Question 6 2 out of 2 points __________ is cryptography wherein two keys are used: one to encrypt the message and another to decrypt it.

#### You've reached the end of your free preview.

Want to read all 10 pages?