Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption

1 Answer

Answer :

(D) Encryption

Related questions

Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption

Last Answer : c) Encryption

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption

Last Answer : a. Guided or Unguided

Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink

Last Answer : (C) Application

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it

Last Answer : c. scrambling it to preserve its security 

Description : Explain encryption and decryption. -Technology

Last Answer : A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation

Last Answer : d. presentation

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : a) Encryption

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : c. Intrusion‐detection software

Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding

Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer

Description : Which of the following is not related to information security on the Internet? (A) Data Encryption (B) Water marking (C) Data Hiding (D) Information Retrieval

Last Answer : (D) Information Retrieval

Description : An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the ... C) American Standard Code for Information Integrity (D) American Standard Code for Isolated Information

Last Answer : (A) American Standard Code for Information Interchange

Description : Transforming thoughts, ideas and messages into verbal and non-verbal signs is referred to as (A) channelization (B) mediation (C) encoding (D) decoding

Last Answer : (C) encoding

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : Errors in computer results could be due to 1) encoding of data 2) transmission of data 3) manipulation of data 4) all of the above

Last Answer : 4) all of the above

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : A major barrier in the transmission of cognitive data in the process of communication is an individual’s (A) personality (B) expectation (C) social status (D) coding ability

Last Answer : (D) coding ability

Description : Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks

Last Answer : a) collision detection

Description : A USB communication device that supports data encryption for secure wireless communication for notebook users is called a a) USB wireless network adapter b) wireless switch c) wireless hub d) router e) None of these

Last Answer : a) USB wireless network adapter

Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.

Description : Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc: a) Session Layer b) Transport Layer c) Presentation Layer d) None of These

Last Answer : c) Presentation Layer

Description : Transmission of printed material over telephone lines. A. Video text B. Facsimile C. Encoding D. Xerox copy

Last Answer : B. Facsimile

Description : In ATM, the _____ layer defines thetransmission medium,bit transmission,encoding, and electrical-to-optical transformation. A) physical B) ATM layer C) AAL D) none of the above

Last Answer : physical

Description : Rate of change of a signal on a transmission medium after encoding and modulation have occurred

Last Answer : baud rate

Description : The process of putting one's thoughts (meaning) into signs (symbols) is called A)decoding. B)noise. C)interference. D)transmission. E)encoding.

Last Answer : E)encoding.

Description : ______ provides synchronization without increasingthe number of bits. A) Scrambling B) Line coding C) Block coding D) None of the above

Last Answer : Scrambling

Description : _______ isnormally referred toas mB/nB coding; it replaceseach m-bit group with an n-bit group. A) Block coding B) Line coding C) Scrambling

Last Answer : Block coding

Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Block coding

Description : ________ is the process of converting digitaldata to adigital signal. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Line coding

Description : __________ conversion involves three techniques: line coding,block coding, and scrambling. A) Analog-to-digital B) Digital-to-analog C) Analog-to-analog D) Digital-to-digital

Last Answer : Digital-to-digital

Description : When a retailer adds unrelated products and product lines to the existing product mix, this is termed 1. range expansion 2. mix scrambling 3. merchandise extension 4. scrambled merchandising 5. none of these

Last Answer : scrambled merchandising

Description : When a retailer adds unrelated products and product lines to the existing product mix this is termed A)range expansion B)mix scrambling C)merchandise extension D)scrambled merchandising

Last Answer : D)scrambled merchandising

Description : Every type of communication is affected by its: (A) Reception (B) Transmission (C) Non-regulation (D) Context

Last Answer : (D) Context

Description : Video transmission over the Internet that looks like delayed live casting is called: (A) virtual video (B) direct broadcast (C) video shift (D) real-time video

Last Answer : (D) real-time video

Description : Does old Windows XP Home edition allow WPA wireless network encryption or is it too old?

Last Answer : If I remember correctly, if you upgrade to SP2, you should be able to use WPA. But the original pre-service pack Windows XP doesn’t support WPA without a patch available from Microsoft. Good luck!