The ____ cipher rearranges the values within a block to create the ciphertext.

A. transposition
B. polyalphabetic substitution
C. Vernam
D. monoalphabetic substitution


Answer: A

Computer Science & Information Technology

You might also like to view...

Table 9.1 lists the two nearest neighbors of four points.

Computer Science & Information Technology

What is the term used when an IDPS doesn't recognize that an attack is underway?

A. false negative B. true positive C. negative activity D. positive signature

Computer Science & Information Technology

C# apps begin execution at method _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ________ area includes the chart and all of its elements

Fill in the blank(s) with correct word

Computer Science & Information Technology