Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with the following key:

image

Using ‘Z’ as bogus character. (A) TAXERTZENZ (B) EXTRANETZZ (C) EZXZTRZANZET (D) EXTZRANZETZ

1 Answer

Answer :

(A) TAXERTZENZ 

Related questions

Description : A message “COMPUTERNETWORK” encrypted(ignore quotes)using columnar transposition cipher with a key “LAYER”. The encrypted message is: (A) CTTOEWMROPNRUEK (B) MROUEKCTTPNROEW (C) OEWPNRCTTUEKMRO (D) UEKPNRMROOEWCTT

Last Answer : (C) OEWPNRCTTUEKMRO

Description : Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE (A) BUTAEEZ (B) SUZANNE (C) XYZABCD (D) ABCDXYZ

Last Answer : (A) BUTAEEZ

Description : The Caesar cipher is a _______cipher that has a key of 3. A. transposition B. killer C. shift D. none of the above

Last Answer : C. shift

Description : A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus. A) mutual engine B) mutation engine C) multiple engine D) polymorphic engine

Last Answer : C) multiple engine

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : What is the process of changing plain-text into cipher-text called?

Last Answer : What is the answer ?

Description : Message can be sent more securely using DES by a. encrypting plain text by a different randomly selected key for each transmission b. encrypting plain text by a different random key for each ... instead of using hardware d. designing DES with high security and not publicizing algorithm used by it  

Last Answer : b. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : Using p=3, q=13, d=7 and e=3 in the RSA algorithm, what is the value of ciphertext for a plain text 5? (A) 13 (B) 21 (C) 26 (D) 33

Last Answer : Answer: Marks to all Explanation: p=3, q=13, d=7, e=3, M=5, C=? C = Me mod n n = p*q  = 3*13 = 39 C = 53 mod 39 = 8 Answer is 8.

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : A) SSL handshake protocol

Description : In SET protocol a customer sends a purchase order a. encrypted with his public key b. in plain text form c. encrypted using Bank’s public key d. using digital Signature system

Last Answer : d. using digital Signature system 

Description : DES works by using a. permutation and substitution on 64 bit blocks of plain text b. only permutations on blocks of 128 bits c. exclusive ORing key bits with 64 bit blocks d. 4 rounds of substitution on 64 bit blocks with 56 bit keys

Last Answer : a. permutation and substitution on 64 bit blocks of plain text 

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv

Last Answer : b. i, ii, iii 

Description : Let R and S be two fuzzy relations defined as: Then, the resulting relation, T, which relates elements of universe x to elements of universe z using max-min composition is given by

Last Answer : Answer: C

Description : Encrypted data is referred as cipher text. -Technology

Last Answer : TrueEncrypted data is presented in coded form. So, it is known as cipher text.

Description : What is cipher text ?

Last Answer : The next encrypted message is cipher text , which is not readable by humans.

Description : Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: I: {B} II: {B, C} III: {A, D} IV: {C, D} If ... the database table? (A) I and III only (B) III and IV only (C) II only (D) I only

Last Answer : (C) II only

Description : Which of the following keys is used to replace a single character with new text? A. S B. s C. r D. C E. None of the above

Last Answer : B. s

Description : In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text. (A) polyalphabetic (B) monoalphabetic (C) transpositional (D) multialphabetic

Last Answer : (B) monoalphabetic

Description : Assume that we need to download text documents at the rate of 100 pages per minute. A page is an average of 24 lines with 80 characters in each line and each character requires 8 bits. Then the required bit rate of the channel is ... ...... (A) 1.636 Kbps (B) 1.636 Mbps (C) 2.272 Mbps (D) 3.272 Kbps

Last Answer : Answer: Marks given to all

Description : What is the purpose of Ctrl + I shortcut key in MS - Word: a) It converts selected text into the next larger size of the same font. b) It applies the Italic formatting to the selected text. c) It makes the selected text bold d) It adds a line break to the document. e) None of The Above

Last Answer : b) It applies the Italic formatting to the selected text.

Description : The map colouring problem can be solved using which of the following technique? (A) Means-end analysis (B) Constraint satisfaction (C) AO* search (D) Breadth first search

Last Answer : (B) Constraint satisfaction

Description : The message 11001001 is to be transmitted using the CRC polynomial x3+1 to protect it from errors. The message that should be transmitted is (A) 110010011001 (B) 11001001 (C) 110010011001001 (D) 11001001011

Last Answer : (D) 11001001011

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : Which involves photo scanning of the text character by character, analysis of the scanned in image , and then translation of the character image into character code? A. OCR B. OMR C. Bar code Reader D. None of the Above

Last Answer : A. OCR

Description : Let A and B be two fuzzy integers defined as: A={(1,0.3), (2,0.6), (3,1), (4,0.7), (5,0.2)} B={(10,0.5), (11,1), (12,0.5)} Using fuzzy arithmetic operation given by (A) {(11,0.8), (13,1), (15,1)} ( ... ,0.2)} (D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}

Last Answer : (D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}

Description : Consider the following transportation problem: The initial basic feasible solution of the above transportation problem using Vogel's Approximation Method(VAM) is given below: The solution of the ... degenerate solution (B) is optimum solution (C) needs to improve (D) is infeasible solution

Last Answer : (B) is optimum solution

Description : Suppose d = { john :40, peter :45}, what happens when we try to retrieve a value using the expression d[ susan ]? a) Since susan is not a value in the set, Python raises a KeyError ... Python raises a KeyError exception d) Since susan is not a key in the set, Python raises a syntax error

Last Answer : c) Since “susan” is not a key in the set, Python raises a KeyError exception

Description : Using the RSA public key crypto system, if p=13, q=31 and d=7, then the value of e is (A) 101 (B) 105 (C) 103 (D) 107

Last Answer : (C) 103 Explanation: Basic RSA Algorithm: 1. Choose two primes, p & q. 2. Compute n=p*q and z=(p-1)*(q-1). 3. Choose a number relatively prime to z and call it d. 4. Find e such that e*d= ... each of these in turn by 7 to see which is divisible by 7, we find that 721/7 = 103, hence e = 103. 

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : How do I track down what could be a bogus PayPal charge?

Last Answer : Annual subscription to the online edition. The Post charges me that as well. it’s worth it to me. This could very well be legitimate.

Description : Is free counseling bogus? Should we stop telling people to get help?

Last Answer : answer:They key to Counseling is a real desire to do the work to change one's life. A psychology intern/student may be of help, and a particular case may need more expertise from an ... Counselor is important. By the way, a psychology student working towards a counseling degree is a professional.

Description : Bogus dining, would one still have to pay, or can they get away (details inside)?

Last Answer : answer:Probably it is up to the restaurant to decide whether to push for the full payment. I imagine most would simply take the starter payments and call it even. It's not worth a scene, especially if ... though; they risk getting in trouble for a salad? Why not at least eat the steak and lobster?

Description : Is my roulette strategy bogus?

Last Answer : Roulette is supposed to have the worst odds ofcall table games. I’m not mathematically gifted, but I believe the experts. Now I will wait to see the logic behind why the experts say the odds are so bad. I’m sure it’s coming.

Description : Is this article about the BP situation bogus(I hope so...)?

Last Answer : first article posted was wrong…correct article now posted

Description : Does homeopathy have any grounding in scientific fact or is it entirely bogus? What fraction of Americans believe in it?

Last Answer : according to wiki: “Claims of homeopathy’s efficacy beyond the placebo effect are unsupported by the collective weight of scientific and clinical evidence.” NHS

Description : Are those Hosting Plan Coupon Codes bogus?

Last Answer : The coupon codes you refer to are just leftover coupons from previous promotions run by Dreamhost (in this case). They will either work or they wont, but there isn’t any “strings”.

Description : Do you think it's bogus that the iphone has been out less time than...

Last Answer : I think it’s because the iPhone caters to the casual user. Versus Blackberrys were originally seen as being more work-related?

Description : What is Extranet ?

Last Answer : Answer : Extranet is a part of the network that gives consumers and providers access to specific parts of the enterprise's intranet. It replaces or complements the existing Electronic Data Interchange (EDI) system.

Description : What is different between Internet, intranet, and extranet?

Last Answer : Apologize for any grammar mistakes. Internet is a term used for global information network as a whole and is not really relevant to other two terms. To speak about specifics we have intranet ... one local network,. This is often connected by VPN and would include satellite offices and teleworkers.

Description : How can the Word-Wide-Web be applied in an Intranet and Extranet?

Last Answer : The Word-Wide-Web can not be applied in an "Intranet" as that islocal to an organisation and not world wide. However the standardsthat are used to build the Word-Wide-Web can be used in anIntranet.

Description : What is the latest scientific cure for nail fungus cure.Iam not interested in bogus cures and am really tired of dealing with this issue for a long time and I got it from gym shower.?

Last Answer : One of the best solutions to nail fungus is Clotrimazole Antifungal Cream. It is quite common now. Depending on how severe and level of damage you have, you may need more than a topical cream (Clotrimazol ... is seperating from the nail bed you may be at the point of needing a RX from a physician.

Description : Explain the difference between Internet, Intranet and Extranet.

Last Answer : All three are terminologies of a how a network can be accessed. They define the access levels for each user which is present inside and outside the network.  Internet: In this, all ... then it is extranet. They are provided access to a limited application in the organization.

Description : The meaning of Extranet is a) Global information system b) Sharing devices update c) Windows for selling d) A private network system to securely share part of business information with their clients.

Last Answer : d) A private network system to securely share part of business information with their clients.

Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these

Last Answer : a)Intranet

Description : What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : c. Extranet

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : EDI use a. requires an extranet b. requires value added network c. can be done on internet d. requires a corporate intranet

Last Answer : c. can be done on internet 

Description : An app, when you use public cloud service,it could encrypt your data, will you be interested to try it anyway?

Last Answer : answer:Assuming that this isn't spam No. Cloud encryption isn't trustworthy. you don't know their algorithm, and if the service can encode it, they can decode it as well. The only way to ... . (See: Megaupload case in New Zealand). I would never trust anything personally important to the cloud.