ExamGecko
Home / ECCouncil / 212-81 / List of questions
Ask Question

ECCouncil 212-81 Practice Test - Questions Answers, Page 15

Add to Whishlist

List of questions

Question 141

Report Export Collapse

In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed

Become a Premium Member for full access
  Unlock Premium Member

Question 142

Report Export Collapse

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

Become a Premium Member for full access
  Unlock Premium Member

Question 143

Report Export Collapse

This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.

Become a Premium Member for full access
  Unlock Premium Member

Question 144

Report Export Collapse

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

Become a Premium Member for full access
  Unlock Premium Member

Question 145

Report Export Collapse

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?

Become a Premium Member for full access
  Unlock Premium Member

Question 146

Report Export Collapse

In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).

Become a Premium Member for full access
  Unlock Premium Member

Question 147

Report Export Collapse

Which of the following techniques is used (other than brute force) to attempt to derive a key?

Become a Premium Member for full access
  Unlock Premium Member

Question 148

Report Export Collapse

Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W. Kravitz, and adopted by the U. S. government in 1993 with FIPS 186?

Become a Premium Member for full access
  Unlock Premium Member

Question 149

Report Export Collapse

Which one of the following uses three different keys, all of the same size?

Become a Premium Member for full access
  Unlock Premium Member

Question 150

Report Export Collapse

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

Become a Premium Member for full access
  Unlock Premium Member
Total 206 questions
Go to page: of 21
Search

Related questions