{"id":25466,"date":"2024-04-15T07:00:36","date_gmt":"2024-04-15T07:00:36","guid":{"rendered":"https:\/\/exam.pscnotes.com\/mcq\/?p=25466"},"modified":"2024-04-15T07:00:36","modified_gmt":"2024-04-15T07:00:36","slug":"the-study-of-encryption-is-called-___________-a-decryption-b-cryptography-c-firewall-d-all-the-above","status":"publish","type":"post","link":"https:\/\/exam.pscnotes.com\/mcq\/the-study-of-encryption-is-called-___________-a-decryption-b-cryptography-c-firewall-d-all-the-above\/","title":{"rendered":"The study of encryption is called ___________. A. Decryption B. Cryptography C. Firewall D. All the above"},"content":{"rendered":"<p>[amp_mcq option1=&#8221;Decryption&#8221; option2=&#8221;Cryptography&#8221; option3=&#8221;Firewall&#8221; option4=&#8221;All the above&#8221; correct=&#8221;option2&#8243;]<!--more--><\/p>\n<p>The correct answer is B. Cryptography.<\/p>\n<p>Cryptography is the study of secret writing. It is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). Cryptography is used in a wide variety of applications, including computer security, data protection, and information assurance.<\/p>\n<p>Decryption is the process of converting encrypted text back into its original form. It is the opposite of encryption.<\/p>\n<p>A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It is used to protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction.<\/p>\n<p>The study of encryption is not called firewall.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[amp_mcq option1=&#8221;Decryption&#8221; option2=&#8221;Cryptography&#8221; option3=&#8221;Firewall&#8221; option4=&#8221;All the above&#8221; correct=&#8221;option2&#8243;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[696],"tags":[],"class_list":["post-25466","post","type-post","status-publish","format-standard","hentry","category-ecommerce","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The study of encryption is called ___________. A. Decryption B. Cryptography C. Firewall D. All the above<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exam.pscnotes.com\/mcq\/the-study-of-encryption-is-called-___________-a-decryption-b-cryptography-c-firewall-d-all-the-above\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The study of encryption is called ___________. A. Decryption B. Cryptography C. Firewall D. All the above\" \/>\n<meta property=\"og:description\" content=\"[amp_mcq option1=&#8221;Decryption&#8221; option2=&#8221;Cryptography&#8221; option3=&#8221;Firewall&#8221; option4=&#8221;All the above&#8221; correct=&#8221;option2&#8243;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exam.pscnotes.com\/mcq\/the-study-of-encryption-is-called-___________-a-decryption-b-cryptography-c-firewall-d-all-the-above\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ and Quiz for Exams\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-15T07:00:36+00:00\" \/>\n<meta name=\"author\" content=\"rawan239\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rawan239\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The study of encryption is called ___________. A. Decryption B. Cryptography C. Firewall D. All the above","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exam.pscnotes.com\/mcq\/the-study-of-encryption-is-called-___________-a-decryption-b-cryptography-c-firewall-d-all-the-above\/","og_locale":"en_US","og_type":"article","og_title":"The study of encryption is called ___________. A. Decryption B. Cryptography C. Firewall D. All the above","og_description":"[amp_mcq option1=&#8221;Decryption&#8221; option2=&#8221;Cryptography&#8221; option3=&#8221;Firewall&#8221; option4=&#8221;All the above&#8221; correct=&#8221;option2&#8243;]","og_url":"https:\/\/exam.pscnotes.com\/mcq\/the-study-of-encryption-is-called-___________-a-decryption-b-cryptography-c-firewall-d-all-the-above\/","og_site_name":"MCQ and Quiz for Exams","article_published_time":"2024-04-15T07:00:36+00:00","author":"rawan239","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rawan239","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exam.pscnotes.com\/mcq\/the-study-of-encryption-is-called-___________-a-decryption-b-cryptography-c-firewall-d-all-the-above\/","url":"https:\/\/exam.pscnotes.com\/mcq\/the-study-of-encryption-is-called-___________-a-decryption-b-cryptography-c-firewall-d-all-the-above\/","name":"The study of encryption is called ___________. A. Decryption B. Cryptography C. Firewall D. All the above","isPartOf":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#website"},"datePublished":"2024-04-15T07:00:36+00:00","dateModified":"2024-04-15T07:00:36+00:00","author":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209"},"breadcrumb":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/the-study-of-encryption-is-called-___________-a-decryption-b-cryptography-c-firewall-d-all-the-above\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exam.pscnotes.com\/mcq\/the-study-of-encryption-is-called-___________-a-decryption-b-cryptography-c-firewall-d-all-the-above\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/exam.pscnotes.com\/mcq\/the-study-of-encryption-is-called-___________-a-decryption-b-cryptography-c-firewall-d-all-the-above\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exam.pscnotes.com\/mcq\/"},{"@type":"ListItem","position":2,"name":"mcq","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/"},{"@type":"ListItem","position":3,"name":"Commerce","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/commerce\/"},{"@type":"ListItem","position":4,"name":"Ecommerce","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/commerce\/ecommerce\/"},{"@type":"ListItem","position":5,"name":"The study of encryption is called ___________. A. Decryption B. Cryptography C. Firewall D. All the above"}]},{"@type":"WebSite","@id":"https:\/\/exam.pscnotes.com\/mcq\/#website","url":"https:\/\/exam.pscnotes.com\/mcq\/","name":"MCQ and Quiz for Exams","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exam.pscnotes.com\/mcq\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209","name":"rawan239","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","caption":"rawan239"},"sameAs":["https:\/\/exam.pscnotes.com"],"url":"https:\/\/exam.pscnotes.com\/mcq\/author\/rawan239\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/25466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/comments?post=25466"}],"version-history":[{"count":0,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/25466\/revisions"}],"wp:attachment":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/media?parent=25466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/categories?post=25466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/tags?post=25466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}