ECCouncil 212-81 Practice Test - Questions Answers, Page 16

List of questions
Question 151

What is the solution to the equation 8 mod 3?
Question 152

What must occur in order for a cipher to be considered 'broken'?
Question 153

MD5 can best be described as which one of the following?
Question 154

What is a 'Collision attack' in cryptography?
Question 155

If the round function is a cryptographically secure pseudorandom function, then ___________ rounds is sufficient to make the block cipher a pseudorandom permutation.
Question 156

____________cryptography uses one key to encrypt a message and a different key to decrypt it.
Question 157

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ________ integrity check mechanism provides security against a replay attack.
Question 158

A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?
Question 159

How can rainbow tables be defeated?
Question 160

Which one of the following is a component of the PKI?
Question