Question 6
If you XOR 10111000 with 10101010, what is the result?
Question 7
A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used to try to discover patterns and use that information to decrypt the cipher.
Question 8
You are studying classic ciphers. You have been examining the difference between single substitution and multi-substitution. Which one of the following is an example of a multi-alphabet cipher?
Question 9
Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?
Question 10
Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?