List of questions
Related questions
Question 48 - 112-51 discussion
Kevin, a security team member, was instructed to share a policy document with the employees. As it was supposed to be shared within the network, he used a simple algorithm to encrypt the document that just rearranges the same characters to produce the ciphertext.
Identify the type of cipher employed by Kevin in the above scenario.
A.
Substitution cipher
B.
Streamn cipher
C.
Transposition cipher
D.
Block cipher
Your answer:
0 comments
Sorted by
Leave a comment first