1. What is Cryptography?
2. Caesar Cipher is an example of
3. An asymmetric-key cipher uses
4. The shift cipher is sometimes referred to as the
5. The substitutional ciphers are
6. The Acronym DES stands for
7. Cryptography, a word with Greek origins, means
8. Cryptography can provide
9. WTLS stands for?
10. Which one is the Heart of Data Encryption Standard
11. A mechanism used to encrypt and decrypt data
12. PKI stands for ________
13. ECB and CBC are ________ ciphers.
14. DES function has _______ components
15. Who started cryptography?
16. MALWARE stand for________
17. Electronic Code Book process is used in ________
18. What is the block size of blowfish block cipher?
19. There is no secret key in case of _______
20. Symmetric-key cryptography is mainly used in our network security
21. Bit stream methods commonly use algorithm functions like the exclusive or operation (__________).
22. The concept of two keys, public and private, is called ____ cryptography.
23. ____ encryption is also called symmetric key encryption.
24. The __________ polyalphabetic cypher uses 26 alphabets.
25. A __________ is a system that protects the computer network from unauthorized access.
26. A ________ sends data between two networks.
27. A ________ network can contain servers as well as individual computers
28. When a wireless client is passively scanning for a bss to join they are listening for a __________.