Encrypted data is also known as

a. clear text
b. cipher text
c. plain text
d. none of the above


b. cipher text

Computer Science & Information Technology

You might also like to view...

Give the function prototype (without parameter names) for each of the following:

a) Function hypotenuse that takes two double-precision, floating-point arguments, side1 and side2, and returns a double-precision, floating-point result. b) Function smallest that takes three integers, x, y and z, and returns an integer. c) Function instructions that does not receive any arguments and does not return a value. [Note: Such functions are commonly used to display instructions to a user.] d) Function intToDouble that takes an integer argument, number, and returns a double precision, floating-point result.

Computer Science & Information Technology

Computers in the DMZ generally have more security defenses via routers and firewalls.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

How many bits are in an IP/v6 address?

A. 32 B. 64 C. 48 D. 128

Computer Science & Information Technology

Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?

A. ciphered B. single C. asymmetric D. symmetric

Computer Science & Information Technology