ExamGecko
Home / ECCouncil / 212-81 / List of questions
Ask Question

ECCouncil 212-81 Practice Test - Questions Answers, Page 17

Add to Whishlist

List of questions

Question 161

Report Export Collapse

Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.

Become a Premium Member for full access
  Unlock Premium Member

Question 162

Report Export Collapse

Which of the following is used to encrypt email and create digital signatures?

Become a Premium Member for full access
  Unlock Premium Member

Question 163

Report Export Collapse

Which service in a PKI will vouch for the identity of an individual or company?

Become a Premium Member for full access
  Unlock Premium Member

Question 164

Report Export Collapse

Which one of the following attempts to hide data in plain view?

Become a Premium Member for full access
  Unlock Premium Member

Question 165

Report Export Collapse

Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.

Become a Premium Member for full access
  Unlock Premium Member

Question 166

Report Export Collapse

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

Become a Premium Member for full access
  Unlock Premium Member

Question 167

Report Export Collapse

Which of the following is an asymmetric algorithm that was first publically described in 1977?

Become a Premium Member for full access
  Unlock Premium Member

Question 168

Report Export Collapse

Bob's password is hashed, and so is John's. Even though they used different passwords, the hash is the same. What is this called?

Become a Premium Member for full access
  Unlock Premium Member

Question 169

Report Export Collapse

What does the OCSP protocol provide?

Become a Premium Member for full access
  Unlock Premium Member

Question 170

Report Export Collapse

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Become a Premium Member for full access
  Unlock Premium Member
Total 206 questions
Go to page: of 21

Related questions