{"id":772,"date":"2021-01-17T05:39:28","date_gmt":"2021-01-16T18:05:53","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0764\/"},"modified":"2021-01-17T05:44:39","modified_gmt":"2021-01-17T05:44:39","slug":"systems-security-certified-practitioner-sscp-question0764","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0764\/","title":{"rendered":"Systems Security Certified Practitioner &#8211; SSCP &#8211; Question0764"},"content":{"rendered":"<div class=\"question\">Which of the following would best describe a Concealment cipher? <br \/><strong><br \/>A.<\/strong> Permutation is used, meaning that letters are scrambled. <br \/><strong>B.<\/strong> Every X number of words within a text, is a part of the real message. <br \/><strong>C.<\/strong> Replaces bits, characters, or blocks of characters with different bits, characters or blocks. <br \/><strong>D.<\/strong> Hiding data in another message so that the very existence of the data is concealed.<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>B<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nWhen a concealment cipher is used, every X number of words within a text, is a part of the real message. The message is within another message.<br \/>\nA concealment cipher is a message within a message. If my other super-secret spy buddy and I decide our key value is every third word, then when I get a message from him, I will pick out every third word and write it down. Suppose he sends me a message that reads, \u201cThe saying, \u2018The time is right\u2019 is not cow language, so is now a dead subject.\u201d Because my key is every third word, I come up with \u201cThe right cow is dead.\u201d This again means nothing to me, and I am now turning in my decoder ring.<br \/>\nConcealment ciphers include the plaintext within the ciphertext. It is up to the recipient to know which letters or symbols to exclude from the ciphertext in order to yield the plaintext. Here is an example of a concealment cipher: i2l32i5321k34e1245ch456oc12ol234at567e<br \/>\nRemove all the numbers, and you&#8217;ll have i like chocolate. How about this one?<br \/>\nLarry even appears very excited. No one worries.<br \/>\nThe first letter from each word reveals the message leave now. Both are easy, indeed, but many people have crafted more ingenious ways of concealing the messages. By the way, this type of cipher doesn&#8217;t even need ciphertext, such as that in the above examples.<br \/>\nConsider the invisible drying ink that kids use to send secret messages. In a more extreme example, a man named Histiaeus, during 5th century B.C., shaved the head of a trusted slave, then tattooed the message onto his bald head. When the slave&#8217;s hair grew back, Histiaeus sent the slave to the message&#8217;s intended recipient, Aristagoros, who shaved the slave&#8217;s head and read the message instructing him to revolt.<br \/>\nThe following answers are incorrect:<br \/>\nA transposition cipher uses permutations. A substitution cipher replaces bits, characters, or blocks of characters with different bits, characters or blocks. Steganography refers to hiding the very existence of the message.<br \/>\nSource: WALLHOFF, John, CBK#5 Cryptography (CISSP Study Guide), April 2002 (page 1). and also see: <a href=\"http:\/\/www.go4expert.com\/forums\/showthread.php?t=415\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/www.go4expert.com\/forums\/showthread.php?t=415<\/a><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Which of the following would best describe a Concealment cipher? A. Permutation is used, meaning that letters are scrambled. B. Every X number of words within a text, is a part of the real message. C. Replaces bits, characters, or blocks of characters with different bits, characters or blocks. D. Hiding data in another message [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[1078,767,3],"class_list":["post-772","post","type-post","status-publish","format-standard","hentry","category-systems-security-certified-practitioner-sscp","tag-choices","tag-question-0764","tag-systems-security-certified-practitioner-sscp"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/comments?post=772"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/772\/revisions"}],"predecessor-version":[{"id":1848,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/772\/revisions\/1848"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/media?parent=772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/categories?post=772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/tags?post=772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}