List of questions
Related questions
Question 74 - ECSS discussion
Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
A.
Transposition cipher
B.
Stream cipher
C.
Block cipher
D.
Substitution cipher
Your answer:
0 comments
Sorted by
Leave a comment first