In which cipher method are values rearranged within a block to create the ciphertext?

A. permutation
B. Vernam
C. substitution
D. monoalphabetic


Answer: A

Computer Science & Information Technology

You might also like to view...

The following statement __________

``` cin >> *num3; ``` a. stores the keyboard input in the variable num3 b. stores the keyboard input into the pointer num3 c. is illegal in C++ d. stores the keyboard input into the variable pointed to by num3 e. None of these

Computer Science & Information Technology

To use an installed Word template, click the File tab, and then in the navigation bar, click New. In the Available Templates list, click ____.

A. Saved Templates B. Existing Templates C. Archived Templates D. Sample Templates

Computer Science & Information Technology

Which of the following is an example of a physical access attack?

a. Using Linux live CD to bypass the password b. Using cross-side scripting c. Using an SLQ injection d. Using NSAudit

Computer Science & Information Technology

The ____________________ family of functions can be used to ensure that the user enters numeric values where necessary.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology