COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following refer to obfuscation methods?Choose all that apply.
A
Encryption
B
Steganography
C
XOR cipher
D
Password salting
E
ROT13
Explanation: 

Detailed explanation-1: -Caesar cipher is an early form of encryption and is also known as a ROT3 cipher.

Detailed explanation-2: -Obfuscation is an umbrella term for a variety of processes that transform data into another form in order to protect sensitive information or personal data. Three of the most common techniques used to obfuscate data are encryption, tokenization, and data masking.

There is 1 question to complete.