ログイン

(Finals) Data and Digital Communication Mocktest BSIT - 505
61問 • 1ヶ月前
  • Xai Alexandrei Delos Reyes
  • 通報

    問題一覧

  • 1

    It is always present to some degree in transmission media and electronic devices and is dependent on the temperature of the medium. In this noise, when the temperature increases, the level of noise increases because of the increased activity of the electrons in the electronic device.

    White noise (Thermal noise or Gaussian noise)

  • 2

    is a noncontinuous noise and one of the most difficult errors to detect because it can occur randomly. Typically, the noise is an analog burst of energy. If the impuls e spike interferes with an analog signal, removing it without affecting the original signal can be difficult.

    Impulse noise (Noise spike)

  • 3

    It is an unwanted coupling between two (2) different signal paths. This unwanted coupling can be electrical, as might occur between two (2) sets of twisted pair wire (as in a phone line), or it can be electromagnetic (as when unwanted signals are picked up by microwave antennas)

    Crosstalk

  • 4

    It is the reflective feedback of a transmitted signal as the signal moves through a medium. It is usually a signal bouncing back from the end of a cable and creating it.

    Echo

  • 5

    It is the result of small timing irregularities that become magnified during the transmission of digital signals as the signals are passed from one device to another. To put it another way, when a digital signal is being transmitted, the rises and falls of the signal can start to shift or become blurry and, thus, produce it.

    Jitter

  • 6

    It is the continuous loss of a signal's strength as it travels through a medium. It is not necessarily a form of error but can indirectly lead to an increase in errors affecting the transmitted signal.

    Attenuation

  • 7

    What type of error is this? It indicates that only one (1) bit of a given data unit (such as a byte, character, or packet) is changed from 1 to 0 or from 0 to 1

    single-bit error

  • 8

    What type of error is this? This indicates that two (2) or more bits in the data unit have changed from 1 to 0 or from 0 to 1. The duration of the noise signal is normally longer than the duration of 1 bit, which means that when noise affects data, it affects a set of bits.

    burst error

  • 9

    It is the central concept in detecting or correcting errors.

    Redundancy

  • 10

    It can be performed in the data link layer. When a device creates a frame of data at the data link layer, it inserts some type of error detection code.

    Error Detection

  • 11

    It is a simple method of error detection is by adding redundant bits called parity bits to each character.

    Parity Check (Vertical Redundancy Check)

  • 12

    Which sentence is NOT TRUE about Parity Check (Vertical Redundancy Check)?

    Specifically, each row of the array is a data block that is to be transmitted

  • 13

    In this type of checking, blocks of data are organized as a two-dimensional array. This method increases the likelihood of detecting burst errors

    Two-Dimensional Parity (Longitudinal Redundancy Check

  • 14

    Which statement is NOT TRUE about Two-Dimensional Parity (Longitudinal Redundancy Check?

    It comes in two (2) basic forms: even parity and odd parity. The basic concept of parity checking is that a bit is added to a string of bits to create either even parity or odd parity.

  • 15

    It is a sequence of numbers and letters used to check data for errors. This sum is then added to the end of the message, and the message is transmitted to the receiving end

    Arithmetic Checksum

  • 16

    Which statement is NOT TRUE about Arithmetic Checksum?

    Review the XOR function and Binary Division.

  • 17

    This method treats the packet of data to be transmitted (the message) as a large polynomial,which adds 8 to 32 check bits to large data packets and yields an error-detection capability,approaching 100 percent.

    Cyclic Redundancy Checksum

  • 18

    Which statement is NOT TRUE about Cyclic Redundancy Checksum?

    It has two (2) sides: sender’s side (checksum creation) and receiver’s side (checksum validation)

  • 19

    Which statement is NOT TRUE about Error Correction?

    A simple method of error detection is by adding redundant bits called parity bits to each character.

  • 20

    It is used to deal with errors that occur when the stop-and-wait flow control protocol is used.

    Stop-and-Wait ARQ

  • 21

    Which is NOT TRUE about how errors can occur?

    the source was not found

  • 22

    It deals with errors that occur when the sliding window protocol is used.

    Go-Back-N ARQ

  • 23

    Under this scheme, only the frame in error is retransmitted. The drawback is that the receiver must provide enough buffer to store the frames that were transmitted after the erroneous frame until the frame has been retransmitted.

    Selective Repeat ARQ

  • 24

    It is the art of ensuring that data is kept private and accessed only by the intended recipient. It does not only apply to the storage of information, but it also applies to the transmission of information.

    Confidentiality

  • 25

    Which statement is NOT TRUE ABOUT Confidentiality?

    is the art of ensuring that data is transmitted from source to destination without alteration.

  • 26

    is the art of ensuring that data is transmitted from source to destination without alteration. It means that changes need to be done only by authorized entities and through authorized mechanisms. It is accomplished with the use of a digital signature, which is a way to know that an electronic document is legit and authentic.

    Integrity

  • 27

    Which statement is NOT TRUE about Integrity?

    It is the information created and stored by an organization that needs to be available to authorized entities

  • 28

    It is the information created and stored by an organization that needs to be available to authorized entities. Information is useless if it is not available. Information needs to be constantly changed, which means it must be accessible to authorized entities.

    Availability

  • 29

    It is the process of verifying that the user is exactly who he claims to be.

    Authentication

  • 30

    It is usually done through the use of passwords or user IDS.

    Single-factor authentication

  • 31

    It is a two-step verification that provides an extra layer of security beyond user ID and password, usually with a software code generator or a hardware-based login key.

    Two-factor authentication

  • 32

    Which statement is NOT TRUE about Authentication?

    It is accomplished through encryption.

  • 33

    Which Statements are TRUE about Network Attacks?

    It is an intrusion on network infrastructure. , The attacker first analyzes the environment and collects information in order to exploit the existing open ports or vulnerabilities. , An attack can be performed either from outside of the organization by an unauthorized entity or from within the company by an “insider” that already has some access to the network.

  • 34

    In Attack threatening Confidentiality, It refers to unauthorized access to or interception of data.

    Snooping

  • 35

    In Attack threatening Confidentiality, Although encipherment of data may make it unintelligible for the interceptor, she can obtain some other types of information by monitoring online traffic.

    Traffic Analysis

  • 36

    In Attacks Threatening Integrity, After intercepting or accessing information, the attacker modifies the information to make it beneficial to herself.

    Modification

  • 37

    In Attacks Threatening Integrity, happens when the attacker impersonates somebody else.

    Masquerading

  • 38

    In Attacks Threatening Integrity, The attacker obtains a copy of a message sent by a user and later tries to replay it.

    Replaying

  • 39

    In Attacks Threatening Integrity, This type of attack is different from others because it is performed by one of the two parties in the communication: the sender or the receiver.

    Repudiation

  • 40

    In Attacks Threatening Availability, it may slow down or totally interrupt the service of a system.

    Denial of Service (DoS)

  • 41

    It is a process of capturing the data packets traveling in the network. It is used by IT professionals to analyze and monitor the traffic to find such things as unexpected suspicious traffic.

    Network sniffing (packet sniffing)

  • 42

    It is a process by which an intruder masquerades as a trusted user in order to gain unauthorized access to a secure environment.

    Spoofing

  • 43

    It is a process of creating IP packets with forged source IP address to impersonate a legitimate system. This kind of spoofing is often used in denial-of-service (DoS) attacks.

    IP address spoofing

  • 44

    It is a process of sending fake ARP messages in the network. The purpose of this type of spoofing is to associate the MAC address with the IP address of another legitimate host, causing traffic redirection to the attacker’s system

    ARP spoofing

  • 45

    It is an attack where the wrong data is inserted into the DNS server cache, causing the DNS server to divert the traffic by returning wrong IP addresses as the results for client queries.

    DNS spoofing

  • 46

    It is an attack that involves placing a software agent between the client and server ends before or during a communication session.

    Man-in-the-middle (MITM) attack

  • 47

    It is an attack that is aimed at preventing unauthorized users from accessing services on the network.

    Denial-of-Service (DoS)

  • 48

    It is a program that installs malicious software while under the guise of doing something else.

    Trojan horse

  • 49

    It refers to the exploitation of a valid computer to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server.

    Session hijacking

  • 50

    It is an attack in which the attacker attempts to fraudulently acquire sensitive information, such as usernames, passwords, and credit card details, by masquerading as a trustworthy entity in a communication session. It is typically carried out by e-mail or instant messaging and often directs users to give details on a website.

    Phishing

  • 51

    It is a method of concealing information from a recognizable text into encrypted form

    Encryption

  • 52

    Encryption transforms readable text, called plaintext (or cleartext), into an unintelligible form, called

    Ciphertext

  • 53

    The purpose of this is to scramble a message so that it remains secure even if the ciphertext is transmitted over a nonsecure medium.

    Encryption Algorithm

  • 54

    The process of recovering a plaintext from its ciphertext is called

    Decryption

  • 55

    It is a system that encrypts and decrypts information

    Cryptosystem

  • 56

    It the art of creating and using cryptosystems

    Cryptography

  • 57

    It is the art of breaking encrypted messages (usually by intruders)

    Cryptanalysis

  • 58

    It is the study of cryptography and cryptanalysis

    Cryptology

  • 59

    Both encryption and decryption use this, in which in the cryptographic sense, is a long string of characters that permits a cryptosystem to encrypt or decrypt information in a distinct way.

    key

  • 60

    The same key is used for encryption and decryption. Both the originator and the recipient of a message must know the key, which is either known to the recipient through some prior arrangement or communicated in parallel with the ciphertext.

    Symmetric Cryptosystems

  • 61

    This uses one key (public-key) for encryption and another key (private-key) for decryption. Each user is assigned a pair of unique and mathematically related keys: a public key and a private key. The private key is a secret key that is available only to the owner, and the public key is published.

    Public-Key Cryptosystems (or Asymmetric Cryptosystems)

  • The Contemporary World Mock test (Prelims)

    The Contemporary World Mock test (Prelims)

    Xai Alexandrei Delos Reyes · 58問 · 2年前

    The Contemporary World Mock test (Prelims)

    The Contemporary World Mock test (Prelims)

    58問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock test (Prelims)

    Computing Mock test (Prelims)

    Xai Alexandrei Delos Reyes · 67問 · 2年前

    Computing Mock test (Prelims)

    Computing Mock test (Prelims)

    67問 • 2年前
    Xai Alexandrei Delos Reyes

    Programming Mock Test (Prelims)

    Programming Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 64問 · 2年前

    Programming Mock Test (Prelims)

    Programming Mock Test (Prelims)

    64問 • 2年前
    Xai Alexandrei Delos Reyes

    Entrepreneurship Mock Test (Prelims)

    Entrepreneurship Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 23問 · 2年前

    Entrepreneurship Mock Test (Prelims)

    Entrepreneurship Mock Test (Prelims)

    23問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test (Midterms) BSIT 107

    Computing Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 76問 · 2年前

    Computing Mock Test (Midterms) BSIT 107

    Computing Mock Test (Midterms) BSIT 107

    76問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mock Test (Prelims)

    Math Mock Test (Prelims)

    Xai Alexandrei Delos Reyes · 48問 · 2年前

    Math Mock Test (Prelims)

    Math Mock Test (Prelims)

    48問 • 2年前
    Xai Alexandrei Delos Reyes

    Programming Mock Test (Midterms) BSIT 107

    Programming Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 52問 · 2年前

    Programming Mock Test (Midterms) BSIT 107

    Programming Mock Test (Midterms) BSIT 107

    52問 • 2年前
    Xai Alexandrei Delos Reyes

    UTS Mock Test (Midterms) BSIT107

    UTS Mock Test (Midterms) BSIT107

    Xai Alexandrei Delos Reyes · 40問 · 2年前

    UTS Mock Test (Midterms) BSIT107

    UTS Mock Test (Midterms) BSIT107

    40問 • 2年前
    Xai Alexandrei Delos Reyes

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 38問 · 2年前

    Entrepreneurship Mock Test (Midterms) BSIT 107

    Entrepreneurship Mock Test (Midterms) BSIT 107

    38問 • 2年前
    Xai Alexandrei Delos Reyes

    Contemporary World Mock Test (Midterms) BSIT 107

    Contemporary World Mock Test (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 28問 · 2年前

    Contemporary World Mock Test (Midterms) BSIT 107

    Contemporary World Mock Test (Midterms) BSIT 107

    28問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mocktest (Midterms) BSIT 107

    Math Mocktest (Midterms) BSIT 107

    Xai Alexandrei Delos Reyes · 24問 · 2年前

    Math Mocktest (Midterms) BSIT 107

    Math Mocktest (Midterms) BSIT 107

    24問 • 2年前
    Xai Alexandrei Delos Reyes

    Computer Programming Mocktest (Pre-finals)

    Computer Programming Mocktest (Pre-finals)

    Xai Alexandrei Delos Reyes · 26問 · 2年前

    Computer Programming Mocktest (Pre-finals)

    Computer Programming Mocktest (Pre-finals)

    26問 • 2年前
    Xai Alexandrei Delos Reyes

    Math Mocktest (Pre-Finals)

    Math Mocktest (Pre-Finals)

    Xai Alexandrei Delos Reyes · 19問 · 2年前

    Math Mocktest (Pre-Finals)

    Math Mocktest (Pre-Finals)

    19問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test (Pre-finals)

    Computing Mock Test (Pre-finals)

    Xai Alexandrei Delos Reyes · 36問 · 2年前

    Computing Mock Test (Pre-finals)

    Computing Mock Test (Pre-finals)

    36問 • 2年前
    Xai Alexandrei Delos Reyes

    Computing Mock Test Finals

    Computing Mock Test Finals

    Xai Alexandrei Delos Reyes · 26問 · 2年前

    Computing Mock Test Finals

    Computing Mock Test Finals

    26問 • 2年前
    Xai Alexandrei Delos Reyes

    Comprog 2nd sem (prelims) BSIT 205

    Comprog 2nd sem (prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 63問 · 1年前

    Comprog 2nd sem (prelims) BSIT 205

    Comprog 2nd sem (prelims) BSIT 205

    63問 • 1年前
    Xai Alexandrei Delos Reyes

    Discrete Math 2nd sem (prelims) BSIT 205

    Discrete Math 2nd sem (prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 36問 · 1年前

    Discrete Math 2nd sem (prelims) BSIT 205

    Discrete Math 2nd sem (prelims) BSIT 205

    36問 • 1年前
    Xai Alexandrei Delos Reyes

    Art Appreciation (Prelim) BSIT 205

    Art Appreciation (Prelim) BSIT 205

    Xai Alexandrei Delos Reyes · 56問 · 1年前

    Art Appreciation (Prelim) BSIT 205

    Art Appreciation (Prelim) BSIT 205

    56問 • 1年前
    Xai Alexandrei Delos Reyes

    Ethics 2nd sem (Prelims) BSIT 205

    Ethics 2nd sem (Prelims) BSIT 205

    Xai Alexandrei Delos Reyes · 45問 · 1年前

    Ethics 2nd sem (Prelims) BSIT 205

    Ethics 2nd sem (Prelims) BSIT 205

    45問 • 1年前
    Xai Alexandrei Delos Reyes

    STS 2nd Sem (Prelim) BSIT 205

    STS 2nd Sem (Prelim) BSIT 205

    Xai Alexandrei Delos Reyes · 40問 · 1年前

    STS 2nd Sem (Prelim) BSIT 205

    STS 2nd Sem (Prelim) BSIT 205

    40問 • 1年前
    Xai Alexandrei Delos Reyes

    問題一覧

  • 1

    It is always present to some degree in transmission media and electronic devices and is dependent on the temperature of the medium. In this noise, when the temperature increases, the level of noise increases because of the increased activity of the electrons in the electronic device.

    White noise (Thermal noise or Gaussian noise)

  • 2

    is a noncontinuous noise and one of the most difficult errors to detect because it can occur randomly. Typically, the noise is an analog burst of energy. If the impuls e spike interferes with an analog signal, removing it without affecting the original signal can be difficult.

    Impulse noise (Noise spike)

  • 3

    It is an unwanted coupling between two (2) different signal paths. This unwanted coupling can be electrical, as might occur between two (2) sets of twisted pair wire (as in a phone line), or it can be electromagnetic (as when unwanted signals are picked up by microwave antennas)

    Crosstalk

  • 4

    It is the reflective feedback of a transmitted signal as the signal moves through a medium. It is usually a signal bouncing back from the end of a cable and creating it.

    Echo

  • 5

    It is the result of small timing irregularities that become magnified during the transmission of digital signals as the signals are passed from one device to another. To put it another way, when a digital signal is being transmitted, the rises and falls of the signal can start to shift or become blurry and, thus, produce it.

    Jitter

  • 6

    It is the continuous loss of a signal's strength as it travels through a medium. It is not necessarily a form of error but can indirectly lead to an increase in errors affecting the transmitted signal.

    Attenuation

  • 7

    What type of error is this? It indicates that only one (1) bit of a given data unit (such as a byte, character, or packet) is changed from 1 to 0 or from 0 to 1

    single-bit error

  • 8

    What type of error is this? This indicates that two (2) or more bits in the data unit have changed from 1 to 0 or from 0 to 1. The duration of the noise signal is normally longer than the duration of 1 bit, which means that when noise affects data, it affects a set of bits.

    burst error

  • 9

    It is the central concept in detecting or correcting errors.

    Redundancy

  • 10

    It can be performed in the data link layer. When a device creates a frame of data at the data link layer, it inserts some type of error detection code.

    Error Detection

  • 11

    It is a simple method of error detection is by adding redundant bits called parity bits to each character.

    Parity Check (Vertical Redundancy Check)

  • 12

    Which sentence is NOT TRUE about Parity Check (Vertical Redundancy Check)?

    Specifically, each row of the array is a data block that is to be transmitted

  • 13

    In this type of checking, blocks of data are organized as a two-dimensional array. This method increases the likelihood of detecting burst errors

    Two-Dimensional Parity (Longitudinal Redundancy Check

  • 14

    Which statement is NOT TRUE about Two-Dimensional Parity (Longitudinal Redundancy Check?

    It comes in two (2) basic forms: even parity and odd parity. The basic concept of parity checking is that a bit is added to a string of bits to create either even parity or odd parity.

  • 15

    It is a sequence of numbers and letters used to check data for errors. This sum is then added to the end of the message, and the message is transmitted to the receiving end

    Arithmetic Checksum

  • 16

    Which statement is NOT TRUE about Arithmetic Checksum?

    Review the XOR function and Binary Division.

  • 17

    This method treats the packet of data to be transmitted (the message) as a large polynomial,which adds 8 to 32 check bits to large data packets and yields an error-detection capability,approaching 100 percent.

    Cyclic Redundancy Checksum

  • 18

    Which statement is NOT TRUE about Cyclic Redundancy Checksum?

    It has two (2) sides: sender’s side (checksum creation) and receiver’s side (checksum validation)

  • 19

    Which statement is NOT TRUE about Error Correction?

    A simple method of error detection is by adding redundant bits called parity bits to each character.

  • 20

    It is used to deal with errors that occur when the stop-and-wait flow control protocol is used.

    Stop-and-Wait ARQ

  • 21

    Which is NOT TRUE about how errors can occur?

    the source was not found

  • 22

    It deals with errors that occur when the sliding window protocol is used.

    Go-Back-N ARQ

  • 23

    Under this scheme, only the frame in error is retransmitted. The drawback is that the receiver must provide enough buffer to store the frames that were transmitted after the erroneous frame until the frame has been retransmitted.

    Selective Repeat ARQ

  • 24

    It is the art of ensuring that data is kept private and accessed only by the intended recipient. It does not only apply to the storage of information, but it also applies to the transmission of information.

    Confidentiality

  • 25

    Which statement is NOT TRUE ABOUT Confidentiality?

    is the art of ensuring that data is transmitted from source to destination without alteration.

  • 26

    is the art of ensuring that data is transmitted from source to destination without alteration. It means that changes need to be done only by authorized entities and through authorized mechanisms. It is accomplished with the use of a digital signature, which is a way to know that an electronic document is legit and authentic.

    Integrity

  • 27

    Which statement is NOT TRUE about Integrity?

    It is the information created and stored by an organization that needs to be available to authorized entities

  • 28

    It is the information created and stored by an organization that needs to be available to authorized entities. Information is useless if it is not available. Information needs to be constantly changed, which means it must be accessible to authorized entities.

    Availability

  • 29

    It is the process of verifying that the user is exactly who he claims to be.

    Authentication

  • 30

    It is usually done through the use of passwords or user IDS.

    Single-factor authentication

  • 31

    It is a two-step verification that provides an extra layer of security beyond user ID and password, usually with a software code generator or a hardware-based login key.

    Two-factor authentication

  • 32

    Which statement is NOT TRUE about Authentication?

    It is accomplished through encryption.

  • 33

    Which Statements are TRUE about Network Attacks?

    It is an intrusion on network infrastructure. , The attacker first analyzes the environment and collects information in order to exploit the existing open ports or vulnerabilities. , An attack can be performed either from outside of the organization by an unauthorized entity or from within the company by an “insider” that already has some access to the network.

  • 34

    In Attack threatening Confidentiality, It refers to unauthorized access to or interception of data.

    Snooping

  • 35

    In Attack threatening Confidentiality, Although encipherment of data may make it unintelligible for the interceptor, she can obtain some other types of information by monitoring online traffic.

    Traffic Analysis

  • 36

    In Attacks Threatening Integrity, After intercepting or accessing information, the attacker modifies the information to make it beneficial to herself.

    Modification

  • 37

    In Attacks Threatening Integrity, happens when the attacker impersonates somebody else.

    Masquerading

  • 38

    In Attacks Threatening Integrity, The attacker obtains a copy of a message sent by a user and later tries to replay it.

    Replaying

  • 39

    In Attacks Threatening Integrity, This type of attack is different from others because it is performed by one of the two parties in the communication: the sender or the receiver.

    Repudiation

  • 40

    In Attacks Threatening Availability, it may slow down or totally interrupt the service of a system.

    Denial of Service (DoS)

  • 41

    It is a process of capturing the data packets traveling in the network. It is used by IT professionals to analyze and monitor the traffic to find such things as unexpected suspicious traffic.

    Network sniffing (packet sniffing)

  • 42

    It is a process by which an intruder masquerades as a trusted user in order to gain unauthorized access to a secure environment.

    Spoofing

  • 43

    It is a process of creating IP packets with forged source IP address to impersonate a legitimate system. This kind of spoofing is often used in denial-of-service (DoS) attacks.

    IP address spoofing

  • 44

    It is a process of sending fake ARP messages in the network. The purpose of this type of spoofing is to associate the MAC address with the IP address of another legitimate host, causing traffic redirection to the attacker’s system

    ARP spoofing

  • 45

    It is an attack where the wrong data is inserted into the DNS server cache, causing the DNS server to divert the traffic by returning wrong IP addresses as the results for client queries.

    DNS spoofing

  • 46

    It is an attack that involves placing a software agent between the client and server ends before or during a communication session.

    Man-in-the-middle (MITM) attack

  • 47

    It is an attack that is aimed at preventing unauthorized users from accessing services on the network.

    Denial-of-Service (DoS)

  • 48

    It is a program that installs malicious software while under the guise of doing something else.

    Trojan horse

  • 49

    It refers to the exploitation of a valid computer to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server.

    Session hijacking

  • 50

    It is an attack in which the attacker attempts to fraudulently acquire sensitive information, such as usernames, passwords, and credit card details, by masquerading as a trustworthy entity in a communication session. It is typically carried out by e-mail or instant messaging and often directs users to give details on a website.

    Phishing

  • 51

    It is a method of concealing information from a recognizable text into encrypted form

    Encryption

  • 52

    Encryption transforms readable text, called plaintext (or cleartext), into an unintelligible form, called

    Ciphertext

  • 53

    The purpose of this is to scramble a message so that it remains secure even if the ciphertext is transmitted over a nonsecure medium.

    Encryption Algorithm

  • 54

    The process of recovering a plaintext from its ciphertext is called

    Decryption

  • 55

    It is a system that encrypts and decrypts information

    Cryptosystem

  • 56

    It the art of creating and using cryptosystems

    Cryptography

  • 57

    It is the art of breaking encrypted messages (usually by intruders)

    Cryptanalysis

  • 58

    It is the study of cryptography and cryptanalysis

    Cryptology

  • 59

    Both encryption and decryption use this, in which in the cryptographic sense, is a long string of characters that permits a cryptosystem to encrypt or decrypt information in a distinct way.

    key

  • 60

    The same key is used for encryption and decryption. Both the originator and the recipient of a message must know the key, which is either known to the recipient through some prior arrangement or communicated in parallel with the ciphertext.

    Symmetric Cryptosystems

  • 61

    This uses one key (public-key) for encryption and another key (private-key) for decryption. Each user is assigned a pair of unique and mathematically related keys: a public key and a private key. The private key is a secret key that is available only to the owner, and the public key is published.

    Public-Key Cryptosystems (or Asymmetric Cryptosystems)