Answer the following statements true (T) or false (F)

1. Symmetric encryption is also referred to as secret-key or single-key encryption.
2. Plaintext is the scrambled message produced as output.
3. If both sender and receiver use the same key the system is referred to as asymmetric.
4. The ciphertext-only attack is the easiest to defend against.
5. A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.


1. True
2. False
3. False
4. True
5. True

Computer Science & Information Technology

You might also like to view...

A dot leader is the most commonly used type of leader with a dot as the leader character

Indicate whether the statement is true or false

Computer Science & Information Technology

When a baseline is first set, the dates and costs saved with the baseline are the same as the scheduled dates and costs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Explain why genetic diversity is a good principle for secure development. Cite an example of lack of diversity that has had a negative impact on security

What will be an ideal response?

Computer Science & Information Technology

Charging, large data transfers, frozen apps, recording HD video, and other intensive tasks can all make a mobile device much _______________ than normal.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology