ECCouncil 212-81 Practice Test - Questions Answers, Page 12

List of questions
Question 111

Which of the following is the standard for digital certificates?
Question 112

Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?
Question 113

Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and C
Question 114

The time and effort required to break a security measure.
Question 115

Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?
Question 116

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.
Question 117

With Cipher feedback (CFB) what happens?
Question 118

Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.
Question 119

What type of encryption uses different keys to encrypt and decrypt the message?
Question 120

With Electronic codebook (ECB) what happens:
Question