ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 74 - ECSS discussion

Report
Export

Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.

Identify the type of cipher employed by Kevin in the above scenario.

A.

Transposition cipher

Answers
A.

Transposition cipher

B.

Stream cipher

Answers
B.

Stream cipher

C.

Block cipher

Answers
C.

Block cipher

D.

Substitution cipher

Answers
D.

Substitution cipher

Suggested answer: A

Explanation:

Atransposition cipherrearranges characters or bits of plaintext to produce ciphertext. In Kevin's scenario, he used an algorithm that rearranges the same characters to create the ciphertext. This aligns with the characteristics of a transposition cipher, where the order of characters is altered without changing their identity.

https://www.newsoftwares.net/blog/the-transposition-cipher-rearranging-data-for-enhanced-encryption/

asked 24/10/2024
Fiston LOMATE
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first