When the information is reverted back into a useful form it is called:
a) Standard encryption
b) Plain text encryption
c) Decryption
d) None of These

1 Answer

Answer :

c) Decryption

Related questions

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : a) Encryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : Explain encryption and decryption. -Technology

Last Answer : A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.

Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption

Last Answer : c) Encryption

Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation

Last Answer : d. presentation

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption

Last Answer : a. Guided or Unguided

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption

Last Answer : (D) Encryption

Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink

Last Answer : (C) Application

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : Can a ctrl-cut/copied text be reverted to a previous unpasted text ?

Last Answer : If you’ve not saved the file since cut/paste, simply “undo” with Control z.

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Have the chat rooms reverted to their former state of perpetual vacuum?

Last Answer : I think it is a function of the constant log in log out things. I tried to sit in there last night but every few seconds it would beep as it kicked me and then logged me back in. So then I turned off the audio notifications but then when a real person came in I didn’t notice until they were gone.

Description : A candidate who fails in two (2) complete CPA examinations shall be: a. Reverted to undergraduate status. b. Forever banned from taking another set of examinations c. Considered as having passed the ... . d. Required to take a refresher course before making another attempt at the CPA Board exams.

Last Answer : Required to take a refresher course before making another attempt at the CPA Board exams.

Description : Number of persons so entitled is more than the posts available then lien will be given on------------ basis a. Junior most person in the grade will be liable to be reverted b . Senior most person in the grade will be liable to reverted c . None of the above

Last Answer : a. Junior most person in the grade will be liable to be reverted

Description : Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc: a) Session Layer b) Transport Layer c) Presentation Layer d) None of These

Last Answer : c) Presentation Layer

Description : For Paste as plain text, you will press: a) Ctrl + Shift + I b) Ctrl + Shift + V c) Ctrl + Shift + K d) None of These

Last Answer : b) Ctrl + Shift + V

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it

Last Answer : c. scrambling it to preserve its security 

Description : Which of the following are a common means for losing encrypted data? a) lose the keys b) lose the encryption standard c) lose the account d) all of the mentioned

Last Answer : lose the keys

Description : Public key encryption method is a system a. which uses a set of public keys one for each participant in e-Commerce b. in which each person who wants to communicate has two keys; a private key known to him ... him. c. which uses the RSA coding system. d. which is a standard for use in e-Commerce.  

Last Answer : b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.

Description : The acronym DES stands for a. Digital Evaluation System b. Digital Encryption Standard c. Digital Encryption System d. Double Encryption Standard

Last Answer : b. Digital Encryption Standard 

Description : What is the process of changing plain-text into cipher-text called?

Last Answer : What is the answer ?

Description : Choose form the following areas where NLP can be useful. a) Automatic Text Summarization b) Automatic Question-Answering Systems c) Information Retrieval d) All of the mentioned

Last Answer : d) All of the mentioned

Description : ______ is an application that converts a programming language into a machine language program: a) Converter b) Compiler c) Encryption d) None of These

Last Answer : b) Compiler

Description : In SET protocol a customer sends a purchase order a. encrypted with his public key b. in plain text form c. encrypted using Bank’s public key d. using digital Signature system

Last Answer : d. using digital Signature system 

Description : …………………………means putting information into special code so that no unauthorized person can use that information. a. Digital Signature b. Coding c. Web Directory d. Encryption

Last Answer : d. Encryption

Description : A USB communication device that supports data encryption for secure wireless communication for notebook users is called a a) USB wireless network adapter b) wireless switch c) wireless hub d) router e) None of these

Last Answer : a) USB wireless network adapter

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption

Last Answer : d. encryption

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption

Last Answer : a. digital wallet

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv