ECCouncil 212-81 Practice Test - Questions Answers, Page 15
List of questions
Question 141
In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed
Question 142
WPA2 uses AES for wireless data encryption at which of the following encryption levels?
Question 143
This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.
Question 144
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
Question 145
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?
Question 146
In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).
Question 147
Which of the following techniques is used (other than brute force) to attempt to derive a key?
Question 148
Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W. Kravitz, and adopted by the U. S. government in 1993 with FIPS 186?
Question 149
Which one of the following uses three different keys, all of the same size?
Question 150
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
Question