ECCouncil 212-81 Practice Test - Questions Answers, Page 15
List of questions
Related questions
In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed
WPA2 uses AES for wireless data encryption at which of the following encryption levels?
This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?
In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).
Which of the following techniques is used (other than brute force) to attempt to derive a key?
Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W. Kravitz, and adopted by the U. S. government in 1993 with FIPS 186?
Which one of the following uses three different keys, all of the same size?
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
Question