click below
click below
Normal Size Small Size show me how
Principles
Principles of Computing
| Question | Answer |
|---|---|
| Decrypt | Transforming ciphertext to plaintext in order to allow authorized parties to access information. |
| Plaintext | The original, understandable information before encryption. |
| Ciphertext | The secret information after encryption. |
| Encrypt | Transforms plaintext to ciphertext and can prevent unauthorized parties from accessing information. |
| The A in the CIA triad is: | Availability |
| What is another word for data hiding? | Steganography |
| Which of the following components of the CIA triad refer to the act of keeping information secret or private from unauthorized parties? | Confidentiality |
| What are two methods of cryptography? | Scytale and Ceasar Cipher |
| Which of the following components of the CIA triad refers to the act of keeping information credible and trustworthy? | Identity |
| A website has an influx of visitors and wants to make sure that the website does not crash and lose customers. Which of the following aspects of the CIA triad is of the greatest concern? | Availability |