ECCouncil 212-81 Practice Test - Questions Answers, Page 17

List of questions
Question 161

Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.
Question 162

Which of the following is used to encrypt email and create digital signatures?
Question 163

Which service in a PKI will vouch for the identity of an individual or company?
Question 164

Which one of the following attempts to hide data in plain view?
Question 165

Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.
Question 166

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.
Question 167

Which of the following is an asymmetric algorithm that was first publically described in 1977?
Question 168

Bob's password is hashed, and so is John's. Even though they used different passwords, the hash is the same. What is this called?
Question 169

What does the OCSP protocol provide?
Question 170

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.
Which Algorithm is this referring to?
Question