CCNA Cyber Ops FAQ: Fundamentals of Cryptography and Public Key Infrastructure (PKI) Q1. Which of the following are examples of common methods used by ciphers? A. Transposition B. Substitution C. Polyalphabetic D. Polynomial Answer: A, B, C. Common methods that ciphers use include substitution, polyalphabetic, and transposition. Q2. Which of the following are examples … [Read more...]