In which cipher method are values rearranged within a block to create the ciphertext?
A. permutation
B. Vernam
C. substitution
D. monoalphabetic
Answer: A
You might also like to view...
The following statement __________
``` cin >> *num3; ``` a. stores the keyboard input in the variable num3 b. stores the keyboard input into the pointer num3 c. is illegal in C++ d. stores the keyboard input into the variable pointed to by num3 e. None of these
To use an installed Word template, click the File tab, and then in the navigation bar, click New. In the Available Templates list, click ____.
A. Saved Templates B. Existing Templates C. Archived Templates D. Sample Templates
Which of the following is an example of a physical access attack?
a. Using Linux live CD to bypass the password b. Using cross-side scripting c. Using an SLQ injection d. Using NSAudit
The ____________________ family of functions can be used to ensure that the user enters numeric values where necessary.
Fill in the blank(s) with the appropriate word(s).