ExamGecko
Home / ECCouncil / 212-81 / List of questions
Ask Question

ECCouncil 212-81 Practice Test - Questions Answers, Page 13

Add to Whishlist

List of questions

Question 121

Report Export Collapse

A disk you rotated to encrypt/decrypt. Created by Leon Alberti. Similar technologies were used in the Enigma machine. Considered the forefather of modern encryption.

Become a Premium Member for full access
  Unlock Premium Member

Question 122

Report Export Collapse

Which of the following uses an 80 bit key on 64 bit blocks?

Become a Premium Member for full access
  Unlock Premium Member

Question 123

Report Export Collapse

Frank is trying to break into an encrypted file... He is attempting all the possible keys that could be used for this algorithm. Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?

Become a Premium Member for full access
  Unlock Premium Member

Question 124

Report Export Collapse

With Cipher-block chaining (CBC) what happens?

Become a Premium Member for full access
  Unlock Premium Member

Question 125

Report Export Collapse

Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm.

Become a Premium Member for full access
  Unlock Premium Member

Question 126

Report Export Collapse

Which of the following equations is related to EC?

Become a Premium Member for full access
  Unlock Premium Member

Question 127

Report Export Collapse

A number that is used only one time, then discarded is called what?

Become a Premium Member for full access
  Unlock Premium Member

Question 128

Report Export Collapse

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

Become a Premium Member for full access
  Unlock Premium Member

Question 129

Report Export Collapse

Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 130

Report Export Collapse

If you use substitution alone, what weakness is present in the resulting cipher text?

Become a Premium Member for full access
  Unlock Premium Member
Total 206 questions
Go to page: of 21

Related questions