Encrypted data is referred as cipher text. -Technology

1 Answer

Answer :

TrueEncrypted data is presented in coded form. So, it is known as cipher text.

Related questions

Description : A message “COMPUTERNETWORK” encrypted(ignore quotes)using columnar transposition cipher with a key “LAYER”. The encrypted message is: (A) CTTOEWMROPNRUEK (B) MROUEKCTTPNROEW (C) OEWPNRCTTUEKMRO (D) UEKPNRMROOEWCTT

Last Answer : (C) OEWPNRCTTUEKMRO

Description : Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE (A) BUTAEEZ (B) SUZANNE (C) XYZABCD (D) ABCDXYZ

Last Answer : (A) BUTAEEZ

Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology

Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.

Description : What is cipher text ?

Last Answer : The next encrypted message is cipher text , which is not readable by humans.

Description : What is the process of changing plain-text into cipher-text called?

Last Answer : What is the answer ?

Description : Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with the following key: Using ‘Z’ as bogus character. (A) TAXERTZENZ (B) EXTRANETZZ (C) EZXZTRZANZET (D) EXTZRANZETZ

Last Answer : (A) TAXERTZENZ 

Description : In SET protocol a customer sends a purchase order a. encrypted with his public key b. in plain text form c. encrypted using Bank’s public key d. using digital Signature system

Last Answer : d. using digital Signature system 

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Which of the following are a common means for losing encrypted data? a) lose the keys b) lose the encryption standard c) lose the account d) all of the mentioned

Last Answer : lose the keys

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B.Steganogrhy. C.Liveanalysis D. Hashing

Last Answer : B.Steganogrhy.

Description : What is first step to Handle Retrieving Data from an Encrypted Hard Drive? A. Formatting disk B. Storing data C. Finding configuration files. D. Deleting files.

Last Answer : C. Finding configuration files. 

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing

Last Answer : B. Steganography. 

Description : What happens when you enter numbers in a Text data type field? -Technology

Last Answer : Numbers are accepted as a text value.

Description : If the data type of a field is set to Text, what will be its number range? -Technology

Last Answer : Its range will be 0 to 255.

Description : When Memo data type is preferred over Text type for a field? -Technology

Last Answer : When the length of the field is more than 255 characters. Text data type is not capable to store the project description because its length cannot be more than 255 characters so, Memo data type is preferred over the Text data type.

Description : Distinguish between Text and Memo data types. -Technology

Last Answer : Distinguishing between Text and Memo are as follows:TextMemoIt is used for relatively short entries.It is used for long text paragraphs.It can store upto 255 characters only.It can store upto 65536 ... the number of characters.It does not use field size property.e.g. Emp_namee.g. Emp_description

Description : Write one example of each field, for which you would use 1. Text data type -Technology

Last Answer : 1. Text data type It allows to store text or combination of text and numbers as well as numbers that don't require calculations such as phone number. This data type allows maximum 255 characters ... Description will be of Memo data type, because the length of description of employee may be large.

Description : What data type should you choose for a zipcode field in a table? (a) Text (b) Number -Technology

Last Answer : (b) Number data type should be chosen for a zip code field in a table.

Description : In a Text type data field, we can enter a maximum of ………….. characters. -Technology

Last Answer : In a Text type data field, we can enter a maximum of 255characters.

Description : A Text data type cannot allow number entry. -Technology

Last Answer : False As, it can include both text as well as numbers.

Description : Interactive combination of text, graphics, images, audio, video etc., is known as (a) Data (b) Information (c) Multimedia (d) Internet -Technology

Last Answer : (c) Multimedia is a interactive combination of text, animations, sounds, images etc.

Description : In Excel chart, text displayed at data points to indicate the specific category is called …………….. -Technology

Last Answer : (c) Text displayed at data points to indicate the specific category is called data label.

Description : What is a good hand cipher?

Last Answer : Here are descriptions of relatively simple hand ciphers. I’m not sure what exactly you want to encode or why but these seem to be a good place to start. You can use any of the as is, or one or more can be modified to varying degrees to create your own cipher.

Description : Can somebody help me solve this cipher?

Last Answer : I’m really puzzled, and don’t see the purpose in translating white noise into anything meaningful. There is nothing there. It’s just static. In the bottom example I began to see a skeleton face in the pixels, but that’s only because my mind took me there, and not because of any hidden image.

Description : What is nsyq ltszsjyk wvy ptrwayoe if it is a vigenere cipher?

Last Answer : gvkgvkg

Description : What is nsyq ltszsjyk wvy ptrwayoe if it is a vigenere cipher?

Last Answer : gvkgvkg

Description : The Caesar cipher is a _______cipher that has a key of 3. A. transposition B. killer C. shift D. none of the above

Last Answer : C. shift

Description : Who introduced gradation of remedies in Repertory. Options: 1) Dr. Cipher 2) Dr. Boenninghausen 3) Dr. Jahr 4) Dr. Lippe

Last Answer : Correct Answer: 2) Dr. Boenninghausen

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : A) SSL handshake protocol

Description : FTP is referred to as (a) Force Transfer Protocol (b) File Transport Protocol (c) File Transfer Partition -Technology

Last Answer : (d) FTP is a protocol through which Internet users can upload files from their computer to a Website. In which, FTP stands for File Transfer Protocol.

Description : Machine language sometimes referred to as (a) programming language that is used widely by the programmer. (b) machine code or object code -Technology

Last Answer : (b) Machine language sometimes referred to as machine code or object code because it is the language which is only understood by the computer as a computer itself is just a machine or an electronic device.

Description : DBMS is a program that controls the creation, maintenance and use of database. Here, DBMS referred to -Technology

Last Answer : (c) Here, DBMS stands for Database Management System.

Description : Why is it so important that users passwords to web sites remain in DB in encrypted form?

Last Answer : Because users are idiots and use the same password for everything. If a hacker gets access to the db they’ll know the users email and password and they probably use the same in for everything from fluther to paypal.

Description : Is there any way to track when a TrueCrypt volume is encrypted or decrypted?

Last Answer : I don't believe you can unencrypt a TrueCrypt volume. You can remove files from the volume, which decrypts them, but your only options with the volume (aka Container) is to continue using it or delete it. ... s a link to the best one I've found Folder Guard I've tried others but they all sucked.

Description : Im trying to convert some dvd's to transfer them to my ipod but it shows me this in handbrake program Please download and install VLC media player in your /Applications folder if you wish to read encrypted DVDs.

Last Answer : You can use RipIt to break the encrypt and then add those videos to handbrake to reduce the size… What to do, though, is try and do the same thing you did before, just with VLC in that folder. It should work then.

Description : I cannot open my files encrypted by AxCrypt after I got my PC ghosted. What should I do?

Last Answer : I have no idea. :-)

Description : what is password for pes 2010 encrypted setup file?

Last Answer : what is password for pes 2010 encrypted setup file?

Description : How to read encrypted email.?

Last Answer : If the email is encrypted you will need a password to open the email. Ask whoever is sending the emails to tell you the password that he or she uses.

Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv

Last Answer : b. i, ii, iii 

Description : One of the problems with using SET protocol is a. the merchant's risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to ... of all customers d. the bank has to keep a database of digital signatures of all customers 

Last Answer : c. the bank has to keep a database of the public keys of all customers

Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender 

Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : In public key encryption if A wants to send an encrypted message a. A encrypts message using his private key b. A encrypts message using B’s private key c. A encrypts message using B’s public key d. A encrypts message using his public key  

Last Answer : c. A encrypts message using B’s public key 

Description : A blog consists of (a) images (b) text (c) links (d) All of these -Technology

Last Answer : (d) A blog consists of images, text and links.