ECCouncil 212-81 Practice Test - Questions Answers, Page 17
List of questions
Related questions
Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.
Which of the following is used to encrypt email and create digital signatures?
Which service in a PKI will vouch for the identity of an individual or company?
Which one of the following attempts to hide data in plain view?
Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.
This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.
Which of the following is an asymmetric algorithm that was first publically described in 1977?
Bob's password is hashed, and so is John's. Even though they used different passwords, the hash is the same. What is this called?
What does the OCSP protocol provide?
In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.
Which Algorithm is this referring to?
Question