Join the discussion
Question 1/34
Cryptography is used to conceal data in transmission by the use of _____.
Correct Answer: C
Explanation: Encryption encodes data in transmission making it unreadable to unauthorised users.
Add Comments
- Other Question (34q)
- Q1. Cryptography is used to conceal data in transmission by the use of _____....
- Q2. According to some sources, in which area is Linux used far more widely than Windows?...
- Q3. Computer security is:
- Q4. What type of information is typically subject to phishing attacks?...
- Q5. What are the three different types of hackers?...
- Q6. The operating system's role in the protection of the system from physical threats involves...
- Q7. Ransomware is a malicious program that can encrypt intercepted data. The attacker controll...
- Q8. SSID stands for what?
- Q9. Which of the following is NOT one of the seven layers of the OSI Model?...
- Q10. What are some of the tunnelling protocols that VPNs use?...
- Q11. Which data storage technology stores data temporarily, not permanently, for use by a devic...
- Q12. Which of the following intrusion detection methods deals with known patterns or attributes...
- Q13. IPv4 requires that every system with connectivity to the Internet have a unique _____ inte...
- Q14. How can you tell if an account on social media has been compromised?...
- Q15. A _____ is anything that can negatively alter, disrupt, hide, or erase an object or object...
- Q16. The password for a wireless security network is also known as the _____....
- Q17. HTTPS _____ the data sent between your web browser and the web site....
- Q18. Which of the following describes a technological response to phishing attacks?...
- Q19. The roots of modern encryption can be traced back almost _____ years....
- Q20. Digital evidence is said to be authentic when _____....
- Q21. Which of these is NOT Bluejacking?
- Q22. Which of the following is NOT direct evidence?...
- Q23. Which internet protocol is responsible for re-transmitting lost or erroneous data packets?...
- Q24. Which of the following is NOT a threat/risk associated with social media?...
- Q25. Which internet protocol is responsible for moving data packets along the Internet network?...
- Q26. What are the four principles of information security?...
- Q27. What service does a VPN solution provide?
- Q28. Which layer provides the physical connection between the computer and network?...
- Q29. Which of the following problems would the OSI Model solve?...
- Q30. Which of the following is a characteristic of data security?...
- Q31. Most web browsers have a little _____ icon that lets you know that your transactions are s...
- Q32. Which term is used to describe initial communication between two Bluetooth devices?...
- Q33. A phishing attack that incorporates personal information about the user is known as which ...
- Q34. Modern encryption is classified as _____ or _____....
