Professional Documents
Culture Documents
1 / 1 pts
Question 1
Correct! Transposition
Encryption
Transportaion
Decryption
1 / 1 pts
Question 2
Man-in-the-middle
Aggressive
Massive
Correct! Active
1 / 1 pts
Question 3
Correct! Encryption
Integrity
Analysis
Masquerade
0 / 1 pts
Question 4
Inference attack
Traffic analysis
1 / 1 pts
Question 5
Correct!
The system is working promptly and the service is not denied to authorized
users.
1 / 1 pts
Question 6
Data
1 / 1 pts
Question 7
1 / 1 pts
Question 8
What will be the cipher of the text (computer Security) using Caesar
Cipher Algorithm with key =4?
Hint:
abc de f ghi j k l m n o p q r s t u v w x y
z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Correct! GSQTYXIVWIGYVMXC
WIGYVMXCGSQTYXIV
GSQTYXIVWIGYVMXZ
WIGYVMXC GSQTYXIV
1 / 1 pts
Question 9
What will be the cipher of the text (computer Security) using Caesar
Cipher Algorithm with key =4?
Hint:
abc de f ghi j k l m n o p q r s t u v w x y
z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Correct! GSQTYXIVWIGYVMXC
GSQTYXIVWIGYVMXZ
WIGYVMXCGSQTYXIV
WIGYVMXC GSQTYXIV
0 / 1 pts
Question 10
What will be the cipher of the text (computer Security) using Caesar
Cipher Algorithm with key =4?
Hint:
abc de f ghi j k l m n o p q r s t u v w x y
z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
ou Answered GSQTYXIVWIGYVMXZ
WIGYVMXCGSQTYXIV
WIGYVMXC GSQTYXIV