Answer the following statements true (T) or false (F)
1. Symmetric encryption is also referred to as secret-key or single-key encryption.
2. Plaintext is the scrambled message produced as output.
3. If both sender and receiver use the same key the system is referred to as asymmetric.
4. The ciphertext-only attack is the easiest to defend against.
5. A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.
1. True
2. False
3. False
4. True
5. True
You might also like to view...
A dot leader is the most commonly used type of leader with a dot as the leader character
Indicate whether the statement is true or false
When a baseline is first set, the dates and costs saved with the baseline are the same as the scheduled dates and costs.
Answer the following statement true (T) or false (F)
Explain why genetic diversity is a good principle for secure development. Cite an example of lack of diversity that has had a negative impact on security
What will be an ideal response?
Charging, large data transfers, frozen apps, recording HD video, and other intensive tasks can all make a mobile device much _______________ than normal.
Fill in the blank(s) with the appropriate word(s).