ECCouncil 212-81 Practice Test - Questions Answers, Page 20
List of questions
Question 191
Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
Question 192
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?
Question 193
Which of the following is the successor of SSL?
Question 194
Which of the following acts as a verifier for the certificate authority?
Question 195
The mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.
Question 196
Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.
Question 197
Storing private keys with a third party is referred to as what?
Question 198
Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.
Question 199
In 1977 researchers and MIT described what asymmetric algorithm?
Question 200
Widely used, particularly with Microsoft operating systems. Created by MIT and derives its name from the mythical three headed dog. The is a great deal of verification for the tickets and the tickets expire quickly. Client authenticates to the Authentication Server once using a long term shared secret and receives back a Ticket-Granting Server. Client can reuse this ticket to get additional tickets without reusing the shared secret. These tickets are used to prove authentication to the Service Server.
Question