Explain encryption and decryption. -Technology

1 Answer

Answer :

A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.

Related questions

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption

Last Answer : c) Encryption

Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation

Last Answer : d. presentation

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption

Last Answer : a. Guided or Unguided

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : a) Encryption

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These

Last Answer : c) Decryption

Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption

Last Answer : (D) Encryption

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink

Last Answer : (C) Application

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : Encryption is the process of transforming ………. -Technology

Last Answer : Encryption is the process of transformingplain text into cipher text.

Description : What is encryption of data? -Technology

Last Answer : Encryption refers to the scrambling of data in some encoded format so that it may be transmitted over networks.

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc: a) Session Layer b) Transport Layer c) Presentation Layer d) None of These

Last Answer : c) Presentation Layer

Description : Can you explain RSA encryption keys in simple enough language for me?

Last Answer : answer:As I understand it (general disclaimer) The public key serves two purposes 1) Hey, I'm using encryption, so we'll have to converse using that, ok? 2) Here's the decoder ring I'm going to ... 't want your key to work anymore, I just change the lock, since I can't necessarily take your key.

Description : Explain why data encryption is required .

Last Answer : Reasons to use data encryption - If data encryption is done, usually unauthorized persons or organizations cannot use the data. The sender encrypts the data using specific code. When the data reaches the ... that data can be used. In this case, the sender must know the rules of decryption.

Description : Is BitLocker disk encryption compatible with online/offline backups?

Last Answer : answer:Are you completely settled on Bit Locker? it was developed by Microsoft and is almost all proprietary (not open source) software. Microsoft has worked with NSA and other organizations in the past. ... to make to you - just that BitLocker is somewhat suspect from a security point of view.

Description : Let us start 2014 with some more outrage: NSA is working on a quantum computer to crack any encryption. How long until you will physically disconnect from the web?

Last Answer : answer:I have nothing to hide. . . I have worked in high clearance areas. @ragingloli is there something you don’t want to tell us?

Description : Any encryption software recommendations?

Last Answer : TrueCrypt is free, open source and WIndows/Mac/Linux compatible www.truecrypt.org/ If you have Windows 7 Ultimate or Enterprise, BitLocker is included http://www.microsoft.com/windows/windows-vista/features/bitlocker.aspx

Description : USB Key Encryption: How?

Last Answer : I don’t recall how. But I am pretty sure you can run TrueCrypt from the USB drive. Google for it. You should find something.

Description : Which is the best encryption mechanism?

Last Answer : Tripple DES is a bit outdated. (DES itself has been around since the sixties). A modern laptop probably has the computational power to break it. A better choice would be AES but I tend to use twofish because I like the name. Don’t know enough about the other to make a recomendation. Sorry.

Description : What is a better encryption?

Last Answer : The Blowfish cipher is far more secure, but it depends what you’re wanting to do with it. What are you encrypting? How secure does it need to be? Is the time taken to decrypt the data a matter of concern? Cryptography is about finding a balance between security and convenience.

Description : Does old Windows XP Home edition allow WPA wireless network encryption or is it too old?

Last Answer : If I remember correctly, if you upgrade to SP2, you should be able to use WPA. But the original pre-service pack Windows XP doesn’t support WPA without a patch available from Microsoft. Good luck!

Description : How do I tell if I have WEP encryption or WPA encryption on my wireless router?

Last Answer : Access your router control panel via a web browser, typically at 192.168.1.1

Description : What are the types of encryption schemes ?

Last Answer : There are two types of encryption schemes, namely: a) Symmetric or secret-key encryption. B) Asymmetric or public-key encryption.

Description : What is Data Encryption ?

Last Answer : The special method by which data can be changed from source to destination before ensuring data security is called data encryption method. Example: The word SAJJAD can be written by encrypting TBKKBE . In ... If TBKKBE is working then you have to decrypt it and understand that it is actually SAJJAD

Description : What is point-to-point encryption (P2PE) ?

Last Answer : Point-to-Point Encryption (P2PE) is the process of encrypting signal or tracked data through a defined "tunnel". It is often applied to data on encrypted credit cards from merchant point-of- ... common retailer called P2PE ( PCI P2PE) violated some notable information in the large retailer system.

Description : What is data encryption ?

Last Answer : Data encryption protects data from the use of unauthorized persons or organizations.

Description : What is an ssl encryption and how will it help my business?

Last Answer : SSL encryption is a means of transferring web data from server to pages over a secure connection. Web security experts Symantec have more information on general internet security, passwords, and encryption.

Description : What exactly is SSL encryption?

Last Answer : SSL encryption is a system that protects data. As the name implies in encrypts the data that is transferred between systems. It also checks to see whether the site is safe and will ... These are additional checks that make sure the transfer of important and sensitive data are performed securely.

Description : How effective is encryption software?

Last Answer : The encryption software available for modern computers is generally pretty hard to crack. Just as long as the program is written properly and you use it properly, encryption software is fairly easy to use, acquire, and very effective.

Description : when AN/PRC-152 radios can store two types of encryption keys: KEKs and TEKs. Choose the maximum number of the two types of keys you can store in the AN/PRC-152's memory for VULOS channels.?

Last Answer : -One KEK-25 TEKs

Description : Encryption of data is important to ensure its privacy. It is most commonly achieved by using a ____. A. public-key encryption B. private-key encryption C. password-key encryption D. character set encryption

Last Answer : A. public-key encryption

Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above

Last Answer : a) Encryption

Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption

Last Answer : d. encryption

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption

Last Answer : a. digital wallet

Description : Encryption can be done A. only on textual data B. only on ASCII coded data C. on any bit string D. only on mnemonic data

Last Answer : C. on any bit string

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption