ECCouncil 212-81 Practice Test - Questions Answers, Page 18
List of questions
Related questions
You are studying classic ciphers. You have been examining the difference between single substitution and multi-substitution. Which one of the following is an example of a multi-alphabet cipher?
Ahlen is using a set of pre-calculated hashes to attempt to derive the passwords from a Windows SAM file. What is a set of pre-calculated hashes used to derive a hashed password called?
Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.
In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?
You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RS
During the process of encryption and decryption, what keys are shared?
How does Kerberos generate the first secret key in the authentication process?
John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?
A part of understanding symmetric cryptography understands the modes in which it can be used. You are
explaining those modes to a group of cryptography students. The most basic encryption mode is____________.
The message is divided into blocks, and each block is encrypted separately with no modification to the process.
Question