In a(n) ____ attack, the attacker eavesdrops during the victim’s session and uses statistical analysis of the user’s typing patterns and inter-keystroke timings to discern sensitive session information.1. timing 2. dictionary 3. replay 4. correlation
Bit stream methods most commonly use functions like the exclusive OR operation (_____).1. OR 2. NOR 3. XOR 4. EOR
The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.1. RSA 2. DES 3. AES 4. MAC
____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.1. Decryption 2. Cryptology 3. Cryptography 4. Encryption
Sign up for free and study better.
Get started today!