Encrypted data is also known as
a. clear text
b. cipher text
c. plain text
d. none of the above
b. cipher text
You might also like to view...
Give the function prototype (without parameter names) for each of the following:
a) Function hypotenuse that takes two double-precision, floating-point arguments, side1 and side2, and returns a double-precision, floating-point result. b) Function smallest that takes three integers, x, y and z, and returns an integer. c) Function instructions that does not receive any arguments and does not return a value. [Note: Such functions are commonly used to display instructions to a user.] d) Function intToDouble that takes an integer argument, number, and returns a double precision, floating-point result.
Computers in the DMZ generally have more security defenses via routers and firewalls.
Answer the following statement true (T) or false (F)
How many bits are in an IP/v6 address?
A. 32 B. 64 C. 48 D. 128
Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?
A. ciphered B. single C. asymmetric D. symmetric