ExamGecko
Home / ECCouncil / 212-81 / List of questions
Ask Question

ECCouncil 212-81 Practice Test - Questions Answers, Page 12

Add to Whishlist

List of questions

Question 111

Report Export Collapse

Which of the following is the standard for digital certificates?

Become a Premium Member for full access
  Unlock Premium Member

Question 112

Report Export Collapse

Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?

Become a Premium Member for full access
  Unlock Premium Member

Question 113

Report Export Collapse

Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and C

Become a Premium Member for full access
  Unlock Premium Member

Question 114

Report Export Collapse

The time and effort required to break a security measure.

Become a Premium Member for full access
  Unlock Premium Member

Question 115

Report Export Collapse

Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?

Become a Premium Member for full access
  Unlock Premium Member

Question 116

Report Export Collapse

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.

Become a Premium Member for full access
  Unlock Premium Member

Question 117

Report Export Collapse

With Cipher feedback (CFB) what happens?

Become a Premium Member for full access
  Unlock Premium Member

Question 118

Report Export Collapse

Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.

Become a Premium Member for full access
  Unlock Premium Member

Question 119

Report Export Collapse

What type of encryption uses different keys to encrypt and decrypt the message?

Become a Premium Member for full access
  Unlock Premium Member

Question 120

Report Export Collapse

With Electronic codebook (ECB) what happens:

Become a Premium Member for full access
  Unlock Premium Member
Total 206 questions
Go to page: of 21

Related questions