An example of the sub - fields of cryptography is:
a) Steganography
b) Traffic Analysis
c) Both of Above
d) None of These

1 Answer

Answer :

c) Both of Above

Related questions

Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Cryptography is an interdisciplinary subject, drawing from several fields. Before the time of computers, it was closely related to linguistic. Nowadays the emphasis has shifted, and cryptography makes extensive use ... as _______mathematics: a) Increte b) Discrete c) Both of Above d) None of These

Last Answer : b) Discrete

Description : Cryptography is an interdisciplinary subject, drawing from several fields. Before the time of computers, it was closely related to linguistic. Nowadays the emphasis has shifted, and cryptography makes extensive use ... as _______mathematics: a) Increte b) Discrete c) Both of Above d) None of These

Last Answer : b) Discrete

Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing.

Last Answer : Acquisition.

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing

Last Answer : B. Steganography. 

Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing. 

Last Answer : A. Acquisition. 

Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates

Last Answer : a. hashing algorithms

Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates

Last Answer : (a) Hashing algorithms

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Cryptography is the study of information______: a) Hiding b) Verification c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Cryptography is the study of information______: a) Hiding b) Verification c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : License is still required to use cryptography in which among the following countries: a) Iran and China b) China and India c) India and Pakistan d) None of These

Last Answer : a) Iran and China

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : Cryptography and Cryptanalysis are sometimes grouped together under the ____term cryptology, encompassing the entire subject. In practice, "cryptography" is also often used to refer to the field as a whole, especially as an applied science: a) Umbrella b) Shield c) Veil d) None of These

Last Answer : a) Umbrella

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Cryptography is derived from the ____word: a) Greek b) French c) Latin d) None of These

Last Answer : a) Greek

Description : License is still required to use cryptography in which among the following countries: a) Iran and China b) China and India c) India and Pakistan d) None of These

Last Answer : a) Iran and China

Description : Symmetric key cryptography was the only kind of encryption publicly known until: a) July 195 b) June, 1976 c) June 1988 d) None of These

Last Answer : b) June, 1976

Description : Cryptography and Cryptanalysis are sometimes grouped together under the ____term cryptology, encompassing the entire subject. In practice, "cryptography" is also often used to refer to the field as a whole, especially as an applied science: a) Umbrella b) Shield c) Veil d) None of These

Last Answer : a) Umbrella

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Cryptography is derived from the ____word: a) Greek b) French c) Latin d) None of These

Last Answer : a) Greek

Description : What are some good books about basic steganography techniques?

Last Answer : I can recommend a good new novel that involves steganography—“Daemon” by Daniel Suarez. About the best tech thriller I’ve ever read.

Description : Which of these exemplifies social steganography?

Last Answer : Sending a hidden message to invite certain people to a party

Description : What is Steganography

Last Answer : Invisible ink writing 

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : What are the sub-fields of Political Geography? -Geography

Last Answer : (i) Electoral Geography (ii) Military Geography

Description : Describe the fields and sub-fields of Geography and its inter-relationship with other fields. -Geography

Last Answer : Nature of Human Geography is inter-disciplinary. In order to understand and describe the human elements found on the earth, human geography has established strong bond with other ... Geography, Urban Geography, Political Geography, Population Geography, Settlement Geography and Economic Geography.

Description : What are the sub-fields of Social Geography? -Geography

Last Answer : Sub-fields of Social Geography are: Behavioral Geography, Geography of Social Well-being, Geography of Leisure, Cultural Geography, Gender Geography, Historical Geography and Medical Geography.

Description : What are the sub-fields of Economic Geography? -Geography

Last Answer : Sub-fields of Economic Geography are: Geography of Resources, Geography of Agriculture, Geography of Tourism, Geography of Industries, Geography of Marketing and Geography of International Trade.

Description : Name some sub-fields of human geography. -Geography

Last Answer : Some sub-fields of human geography are: Behavioral geography, Geography of social well-being, Geography of leisure, Cultured geography, Gender geography, Historical geography, Medical geography, ... of industries, Geography of Marketing, Geography of Tourism and Geography of international trade.

Description : Evaluating testability of the requirements and system are a part of which phase:- a) Test Analysis and Design b) Test Planning and control c) Test Implementation and execution d) Evaluating ... text box which accepts alphabets in lower or upper case. Identify the invalid Equivalence class value.

Last Answer : a) Test Analysis and Design

Description : Noise level heard inside a bus in busy city traffic or inside a sub-way train corresponds to about __________ decibels. (A) 75 (B) 95 (C) 120 (D) 140

Last Answer : (B) 95

Description : Shoulders for high traffic volume roads, should (A) Be stable throughout the year to be used by vehicles in the case of emergency (B) Support and protect the ends of carriage ways (C) Not allow entrance of water to sub-grade (D) All the above

Last Answer : Answer: Option D

Description : Design of flexible pavement, involves (A) Wheel loads (B) Intensity of traffic (C) Climate of the region (D) Sub-grade conditions

Last Answer : Answer: Option C

Description : The fundamental factor in the selection of pavement type is (A) Climatic condition (B) Type and intensity of traffic (C) Sub-grade soil and drainage conditions (D) Availability of funds for the construction project

Last Answer : Answer: Option B

Description : What is the answer to the Alan turing cryptography challenge chapter 3 2018?

Last Answer : Feel Free to Answer

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None

Last Answer : c. Asymmetric

Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None

Last Answer : b. Symmetric

Description : Secret key is used for a. Public key cryptography b. Private key cryptography c. Asymmetric key cryptography d. None of these

Last Answer : b. Private key cryptography

Description : Which one is not used as a security mechanism? a. Encryption b. Cryptography c. Wallets d. Digital signature

Last Answer : c. Wallets

Description : In Electronic cash payment a. a debit card payment system is used b. a customer buys several electronic coins which are digitally signed by coin issuing bank c. a credit card payment system is used d. RSA cryptography is used in the transactions 

Last Answer : b. a customer buys several electronic coins which are digitally signed by coin issuing bank 

Description : Explain sub-netting and super-netting with example.

Last Answer : Sub-netting:subnet mask is a net mask with the only real difference being that breaking a larger network into smaller parts and each smaller section will use different sets of address ... address) AND 11111111.11111111.11111100.00000000 (supernet mask) Returns 11000000.10101000.01000000.00000000

Description : Traffic engineering only includes (A) Planning of regulatory measures (B) Design and application of control devices (C) Analysis of traffic characteristics (D) All the above

Last Answer : Answer: Option D

Description : Location analysis techniques typical typically employed by manufact anufacturing organizations include include a. transportation method b. queuing theory queuing theory c. correlation correlation analysis analysis and traffic traffic counts d. simulation

Last Answer : a. transportation method

Description : Location analysis techniques typical typically employed employed by service organizations include a. factor rating method b. center of gravity method center of gravity method c. purchasing purchasing power analysis analysis of area d. traffic traffic counts e. all of the above

Last Answer : e. all of the above