0% found this document useful (0 votes)
22 views2 pages

Network Security and Encryption Basics

The document consists of exercises related to network failures, encryption, and ciphers. It includes fill-in-the-blank questions, true/false statements, and open-ended questions about the impact of network issues and the principles of encryption. Additionally, it covers specific ciphers such as the Caesar cipher and Pigpen cipher, requiring examples and explanations.

Uploaded by

kajoltanaya99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views2 pages

Network Security and Encryption Basics

The document consists of exercises related to network failures, encryption, and ciphers. It includes fill-in-the-blank questions, true/false statements, and open-ended questions about the impact of network issues and the principles of encryption. Additionally, it covers specific ciphers such as the Caesar cipher and Pigpen cipher, requiring examples and explanations.

Uploaded by

kajoltanaya99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1.

Fill in the Blanks


a. ________________________ is when a fault with hardware or software stops a
network from working properly.
b. Encryption helps to exchange data between _________________ and browsers
safely.
c. Encrypted data is known as __________________.
d. ____________________ helps to protect the data you send, receive or store.
e. _____________________refers to the criminal activities carried out by the means
of computers on the internet.
f. An ________________________ is the secret that explains how a message is
coded.
g. A ciphertext can be decrypted by applying the same number of shift in the
________________direction.
h. The two types of cipher texts are __________________ and _______________.
i. ______________________ is also known as substitution cipher.

2. True and False


a. Network Failure may affect some services connected to the network.
b. The jobs of police officers can be affected if there is a network error.
c. Unencrypted data is called plain text.
d. Encryption stops people from intercepting a message.
e. Cybercriminals try to steal personal information for financial gain.
3. Answer the Following
a. Give two examples of how network failure affects hospitals.
________________________________________________________________________
________________________________________________________________________
b. What do you mean by encryption?
________________________________________________________________________
________________________________________________________________________
Why do applications need to use encryption?
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
c. What is a Caesar cipher?
________________________________________________________________________
________________________________________________________________________
d. Encrypt the word “Happy” using Caesar Cipher with a key of 4.
________________________________________________________________________
e. Decode “ZHOO GRQH” with a key of 3.
________________________________________________________________________
f. Draw the Pigpen cipher key.

g. Explain the difference between Pigpen cipher and Caesar cipher.


________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

You might also like