ECCouncil 212-81 Practice Test - Questions Answers, Page 15

List of questions
Question 141

In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed
Question 142

WPA2 uses AES for wireless data encryption at which of the following encryption levels?
Question 143

This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.
Question 144

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
Question 145

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?
Question 146

In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).
Question 147

Which of the following techniques is used (other than brute force) to attempt to derive a key?
Question 148

Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W. Kravitz, and adopted by the U. S. government in 1993 with FIPS 186?
Question 149

Which one of the following uses three different keys, all of the same size?
Question 150

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
Question