ECCouncil 212-81 Practice Test - Questions Answers, Page 19

List of questions
Question 181

Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
Question 182

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?
Question 183

Why is quantum computing a threat to RSA?
Question 184

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.
Question 185

Which of the following is an asymmetric algorithm related to the equation y^2 = x^3 + Ax + B?
Question 186

Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?
Question 187

Which of the following is assured by the use of a hash?
Question 188

Which method of password cracking takes the most time and effort?
Question 189

Which one of the following terms describes two numbers that have no common factors?
Question 190

A ______ refers to a situation where two different inputs yield the same output.
Question