Tag: security

Questions Related to security

  1. Decryptor

  2. Cryptanalyst

  3. Hacker

  4. Decoder


Correct Option: B

What does the NIST use to generate Photons for Quantum Encryption

  1. Ruby Crystal Lasers

  2. Silicon Diode Laser

  3. Infra Red Lasers

  4. Compound Laser


Correct Option: C

How many interative steps does The AES have for Encryption for 128 and 192 bits

  1. 8

  2. 9

  3. 10

  4. 11


Correct Option: A,C

Identify the Two parts of Blow fish Encryption

  1. Modulation of data

  2. encryption of the data

  3. expansion of the key

  4. Join Key to data


Correct Option: B,C