Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These
Description : Cryptography is an interdisciplinary subject, drawing from several fields. Before the time of computers, it was closely related to linguistic. Nowadays the emphasis has shifted, and cryptography makes extensive use ... as _______mathematics: a) Increte b) Discrete c) Both of Above d) None of These
Last Answer : b) Discrete
Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing.
Last Answer : Acquisition.
Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing
Last Answer : B. Steganography.
Last Answer : A. Acquisition.
Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates
Last Answer : a. hashing algorithms
Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates
Last Answer : (a) Hashing algorithms
Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These
Last Answer : a) Encryption
Description : Cryptography is the study of information______: a) Hiding b) Verification c) Both of Above d) None of These
Description : License is still required to use cryptography in which among the following countries: a) Iran and China b) China and India c) India and Pakistan d) None of These
Last Answer : a) Iran and China
Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These
Last Answer : b) June, 1976
Description : Cryptography and Cryptanalysis are sometimes grouped together under the ____term cryptology, encompassing the entire subject. In practice, "cryptography" is also often used to refer to the field as a whole, especially as an applied science: a) Umbrella b) Shield c) Veil d) None of These
Last Answer : a) Umbrella
Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above
Last Answer : d) All of the Above
Description : Cryptography is derived from the ____word: a) Greek b) French c) Latin d) None of These
Last Answer : a) Greek
Description : Which among the following is correct about goals in cryptography: a) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps ... not be able to deny sending the message e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These
Description : What are some good books about basic steganography techniques?
Last Answer : I can recommend a good new novel that involves steganography—“Daemon” by Daniel Suarez. About the best tech thriller I’ve ever read.
Description : Which of these exemplifies social steganography?
Last Answer : Sending a hidden message to invite certain people to a party
Description : What is Steganography
Last Answer : Invisible ink writing
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : What are the sub-fields of Political Geography? -Geography
Last Answer : (i) Electoral Geography (ii) Military Geography
Description : Describe the fields and sub-fields of Geography and its inter-relationship with other fields. -Geography
Last Answer : Nature of Human Geography is inter-disciplinary. In order to understand and describe the human elements found on the earth, human geography has established strong bond with other ... Geography, Urban Geography, Political Geography, Population Geography, Settlement Geography and Economic Geography.
Description : What are the sub-fields of Social Geography? -Geography
Last Answer : Sub-fields of Social Geography are: Behavioral Geography, Geography of Social Well-being, Geography of Leisure, Cultural Geography, Gender Geography, Historical Geography and Medical Geography.
Description : What are the sub-fields of Economic Geography? -Geography
Last Answer : Sub-fields of Economic Geography are: Geography of Resources, Geography of Agriculture, Geography of Tourism, Geography of Industries, Geography of Marketing and Geography of International Trade.
Description : Name some sub-fields of human geography. -Geography
Last Answer : Some sub-fields of human geography are: Behavioral geography, Geography of social well-being, Geography of leisure, Cultured geography, Gender geography, Historical geography, Medical geography, ... of industries, Geography of Marketing, Geography of Tourism and Geography of international trade.
Description : Evaluating testability of the requirements and system are a part of which phase:- a) Test Analysis and Design b) Test Planning and control c) Test Implementation and execution d) Evaluating ... text box which accepts alphabets in lower or upper case. Identify the invalid Equivalence class value.
Last Answer : a) Test Analysis and Design
Description : Noise level heard inside a bus in busy city traffic or inside a sub-way train corresponds to about __________ decibels. (A) 75 (B) 95 (C) 120 (D) 140
Last Answer : (B) 95
Description : Shoulders for high traffic volume roads, should (A) Be stable throughout the year to be used by vehicles in the case of emergency (B) Support and protect the ends of carriage ways (C) Not allow entrance of water to sub-grade (D) All the above
Last Answer : Answer: Option D
Description : Design of flexible pavement, involves (A) Wheel loads (B) Intensity of traffic (C) Climate of the region (D) Sub-grade conditions
Last Answer : Answer: Option C
Description : The fundamental factor in the selection of pavement type is (A) Climatic condition (B) Type and intensity of traffic (C) Sub-grade soil and drainage conditions (D) Availability of funds for the construction project
Last Answer : Answer: Option B
Description : What is the answer to the Alan turing cryptography challenge chapter 3 2018?
Last Answer : Feel Free to Answer
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : Secret key is used for a. Public key cryptography b. Private key cryptography c. Asymmetric key cryptography d. None of these
Last Answer : b. Private key cryptography
Description : Which one is not used as a security mechanism? a. Encryption b. Cryptography c. Wallets d. Digital signature
Last Answer : c. Wallets
Description : In Electronic cash payment a. a debit card payment system is used b. a customer buys several electronic coins which are digitally signed by coin issuing bank c. a credit card payment system is used d. RSA cryptography is used in the transactions
Last Answer : b. a customer buys several electronic coins which are digitally signed by coin issuing bank
Description : Explain sub-netting and super-netting with example.
Last Answer : Sub-netting:subnet mask is a net mask with the only real difference being that breaking a larger network into smaller parts and each smaller section will use different sets of address ... address) AND 11111111.11111111.11111100.00000000 (supernet mask) Returns 11000000.10101000.01000000.00000000
Description : Traffic engineering only includes (A) Planning of regulatory measures (B) Design and application of control devices (C) Analysis of traffic characteristics (D) All the above
Description : Location analysis techniques typical typically employed by manufact anufacturing organizations include include a. transportation method b. queuing theory queuing theory c. correlation correlation analysis analysis and traffic traffic counts d. simulation
Last Answer : a. transportation method
Description : Location analysis techniques typical typically employed employed by service organizations include a. factor rating method b. center of gravity method center of gravity method c. purchasing purchasing power analysis analysis of area d. traffic traffic counts e. all of the above
Last Answer : e. all of the above