COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What term is used to describe the technology that replaces sensitive information with a nonsensitive version?
A
blanking
B
masking
C
retracting
D
hiding
E
whiteout
Explanation: 

Detailed explanation-1: -Tokenization replaces sensitive information with equivalent, non-confidential information. The replacement data is called a token. Tokens can be generated in a number of ways: Using encryption, which can be reversed using a cryptographic key.

Detailed explanation-2: -Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.

Detailed explanation-3: -Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

Detailed explanation-4: -In this cipher, two different keys–public key and private key–are used for encryption and decryption. The sender uses the public key to perform the encryption, but the private key is kept secret from the receiver. This is also known as “asymmetric key algorithm."

Detailed explanation-5: -In asymmetric, or public key, encryption, there are two keys: one key is used for encryption, and a different key is used for decryption.

There is 1 question to complete.