ECCouncil 212-81 Practice Test - Questions Answers
List of questions
Related questions
Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.
Which of the following statements is most true regarding binary operations and encryption?
A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used to try to discover patterns and use that information to decrypt the cipher.
What is an IV?
Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.
The most common way steganography is accomplished is via which one of the following?
A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed
The reverse process from encoding - converting the encoded message back into its plaintext format.
Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186
If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?
Question