ECCouncil 212-81 Practice Test - Questions Answers, Page 18

List of questions
Question 171

You are studying classic ciphers. You have been examining the difference between single substitution and multi-substitution. Which one of the following is an example of a multi-alphabet cipher?
Question 172

Ahlen is using a set of pre-calculated hashes to attempt to derive the passwords from a Windows SAM file. What is a set of pre-calculated hashes used to derive a hashed password called?
Question 173

Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.
Question 174

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?
Question 175

You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RS
Question 176

During the process of encryption and decryption, what keys are shared?
Question 177

How many qubits are needed to break RSA?
Question 178

How does Kerberos generate the first secret key in the authentication process?
Question 179

John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?
Question 180

A part of understanding symmetric cryptography understands the modes in which it can be used. You are
explaining those modes to a group of cryptography students. The most basic encryption mode is____________.
The message is divided into blocks, and each block is encrypted separately with no modification to the process.
Question