ECCouncil 212-81 Practice Test - Questions Answers, Page 16
List of questions
Related questions
What must occur in order for a cipher to be considered 'broken'?
MD5 can best be described as which one of the following?
What is a 'Collision attack' in cryptography?
If the round function is a cryptographically secure pseudorandom function, then ___________ rounds is sufficient to make the block cipher a pseudorandom permutation.
____________cryptography uses one key to encrypt a message and a different key to decrypt it.
As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ________ integrity check mechanism provides security against a replay attack.
A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?
How can rainbow tables be defeated?
Which one of the following is a component of the PKI?
Question