Network Security
1. ________ is the science and art of transforming messages to make them secure and immune to attacks.
A.  Cryptography B.  Cryptoanalysis C.  either (a) or (b) D.  neither (a) nor (b)
2. The ________is the original message before transformation
A.  ciphertext B.  plaintext C.  secret-text D.  none of the above
3. The ________ is the message after transformation
A.  ciphertext B.  plaintext C.  secret-text D.  none of the above
4. A(n) _______ algorithm transforms plaintext to ciphertext
A.  encryption B.  decryption C.  either (a) or (b) D.  neither (a) nor (b)
5. A(n) ______ algorithm transforms ciphertext to plaintext
A.  encryption B.  decryption C.  either (a) or (b) D.  neither (a) nor (b)
6. A combination of an encryption algorithm and a decryption algorithm is called a ________.
A.  cipher B.  secret C.  key D.  none of the above
7. The _______ is a number or a set of numbers on which the cipher operates
A.  cipher B.  secret C.  key D.  none of the above
8. In a(n) ________ cipher, the same key is used by both the sender and receiver.
A.  symmetric-key B.  asymmetric-key C.  either (a) or (b) D.  neither (a) nor (b)
9. In a(n) ________, the key is called the secret key.
A.  symmetric-key B.  asymmetric-key C.  either (a) or (b) D.  neither (a) nor (b)
10. . In a(n) ________ cipher, a pair of keys is used.
A.  symmetric-key B.  asymmetric-key C.  either (a) or (b) D.  neither (a) nor (b)