ECCouncil 212-81 Practice Test - Questions Answers, Page 13
List of questions
Related questions
A disk you rotated to encrypt/decrypt. Created by Leon Alberti. Similar technologies were used in the Enigma machine. Considered the forefather of modern encryption.
Which of the following uses an 80 bit key on 64 bit blocks?
Frank is trying to break into an encrypted file... He is attempting all the possible keys that could be used for this algorithm. Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?
With Cipher-block chaining (CBC) what happens?
Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm.
Which of the following equations is related to EC?
A number that is used only one time, then discarded is called what?
A simple algorithm that will take the initial key and from that generate a slightly different key each round.
Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?
If you use substitution alone, what weakness is present in the resulting cipher text?
Question