Documente Academic
Documente Profesional
Documente Cultură
Anna University
Unit III
3. Time taken to apply an algorithm in ______ is proportional to the length of the message.
A. Trigrams
B. Diagrams
C. Encipherment Complexity
D. User domain
4. The purpose of computer security is to prevent ______ from doing the _______.
A. attacks, harm
B. attackers, damage
C. threat, needful
D. employees, interference
5. The value of _____ and _____ should not be forgotten when we consider how to enforce security.
A. policies, expectations
B. policies, procedures
C. community standards, expectations
D. community standards, policies
26. Asymmetric encryption offers a procedure that wraps the protected information in _______
package(s).
A. Two
B. Three
C. Four
D. One
27. The property of hiding implementation and other design decisions of a component is called___.
A. Modularity
B. Encapsulation
C. Polymorphism
D. Information Hiding
30. In a ______, the frequency of appearance of letter groups can be used to match up plaintext letters
that have been separated in a ciphertext.
A. Digram
B. Columnar Transposition
C. Book Cipher
D. Vernam Cipher