ExamGecko
Home / ECCouncil / 212-81 / List of questions
Ask Question

ECCouncil 212-81 Practice Test - Questions Answers, Page 14

Add to Whishlist

List of questions

Question 131

Report Export Collapse

What is the basis for the FISH algorithm?

Become a Premium Member for full access
  Unlock Premium Member

Question 132

Report Export Collapse

If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a 'strong' pseudorandom permutation.

Become a Premium Member for full access
  Unlock Premium Member

Question 133

Report Export Collapse

Which one of the following best describes a process that splits the block of plaintext into two separate blocks, then applies the round function to one half, and finally swaps the two halves?

Become a Premium Member for full access
  Unlock Premium Member

Question 134

Report Export Collapse

John is trying to explain the basics of cryptography to a group of young, novice, security students. Which one of the following most accurately defines encryption?

Become a Premium Member for full access
  Unlock Premium Member

Question 135

Report Export Collapse

Numbers that have no factors in common with another.

Become a Premium Member for full access
  Unlock Premium Member

Question 136

Report Export Collapse

RFC 1321 describes what hash?

Become a Premium Member for full access
  Unlock Premium Member

Question 137

Report Export Collapse

Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 Xi m.

Become a Premium Member for full access
  Unlock Premium Member

Question 138

Report Export Collapse

Which algorithm implements an unbalanced Feistel cipher?

Become a Premium Member for full access
  Unlock Premium Member

Question 139

Report Export Collapse

What is a variation of DES that uses a technique called Key Whitening?

Become a Premium Member for full access
  Unlock Premium Member

Question 140

Report Export Collapse

You are explaining the details of the AES algorithm to cryptography students. You are discussing the derivation of the round keys from the shared symmetric key. The portion of AES where round keys are derived from the cipher key using Rijndael's key schedule is called what?

Become a Premium Member for full access
  Unlock Premium Member
Total 206 questions
Go to page: of 21

Related questions