ExamGecko
Home / ECCouncil / 212-81 / List of questions
Ask Question

ECCouncil 212-81 Practice Test - Questions Answers, Page 18

Add to Whishlist

List of questions

Question 171

Report Export Collapse

You are studying classic ciphers. You have been examining the difference between single substitution and multi-substitution. Which one of the following is an example of a multi-alphabet cipher?

Become a Premium Member for full access
  Unlock Premium Member

Question 172

Report Export Collapse

Ahlen is using a set of pre-calculated hashes to attempt to derive the passwords from a Windows SAM file. What is a set of pre-calculated hashes used to derive a hashed password called?

Become a Premium Member for full access
  Unlock Premium Member

Question 173

Report Export Collapse

Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.

Become a Premium Member for full access
  Unlock Premium Member

Question 174

Report Export Collapse

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

Become a Premium Member for full access
  Unlock Premium Member

Question 175

Report Export Collapse

You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RS

Become a Premium Member for full access
  Unlock Premium Member

Question 176

Report Export Collapse

During the process of encryption and decryption, what keys are shared?

Become a Premium Member for full access
  Unlock Premium Member

Question 177

Report Export Collapse

How many qubits are needed to break RSA?

Become a Premium Member for full access
  Unlock Premium Member

Question 178

Report Export Collapse

How does Kerberos generate the first secret key in the authentication process?

Become a Premium Member for full access
  Unlock Premium Member

Question 179

Report Export Collapse

John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?

Become a Premium Member for full access
  Unlock Premium Member

Question 180

Report Export Collapse

A part of understanding symmetric cryptography understands the modes in which it can be used. You are

explaining those modes to a group of cryptography students. The most basic encryption mode is____________.

The message is divided into blocks, and each block is encrypted separately with no modification to the process.

Become a Premium Member for full access
  Unlock Premium Member
Total 206 questions
Go to page: of 21
Search

Related questions