ECCouncil 212-81 Practice Test - Questions Answers, Page 2
List of questions
Related questions
Uses a formula, M_n = 2^n 1 where n is a prime number, to generate primes. Works for 2, 3, 5, 7 but fails on 11 and on many other n values.
An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?
This is a proprietary version of PAP. Encrypts username and password as it is sent across network.
The ATBASH cipher is best described as what type of cipher?
Developed by Netscape and has been replaced by TLS. It was the preferred method used with secure websites.
John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)
Which of the following would be the weakest encryption algorithm?
What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?
Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.
Question