ExamGecko
Home / ECCouncil / 212-81 / List of questions
Ask Question

ECCouncil 212-81 Practice Test - Questions Answers, Page 20

Add to Whishlist

List of questions

Question 191

Report Export Collapse

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Become a Premium Member for full access
  Unlock Premium Member

Question 192

Report Export Collapse

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

Become a Premium Member for full access
  Unlock Premium Member

Question 193

Report Export Collapse

Which of the following is the successor of SSL?

Become a Premium Member for full access
  Unlock Premium Member

Question 194

Report Export Collapse

Which of the following acts as a verifier for the certificate authority?

Become a Premium Member for full access
  Unlock Premium Member

Question 195

Report Export Collapse

The mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.

Become a Premium Member for full access
  Unlock Premium Member

Question 196

Report Export Collapse

Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.

Become a Premium Member for full access
  Unlock Premium Member

Question 197

Report Export Collapse

Storing private keys with a third party is referred to as what?

Become a Premium Member for full access
  Unlock Premium Member

Question 198

Report Export Collapse

Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.

Become a Premium Member for full access
  Unlock Premium Member

Question 199

Report Export Collapse

In 1977 researchers and MIT described what asymmetric algorithm?

Become a Premium Member for full access
  Unlock Premium Member

Question 200

Report Export Collapse

Widely used, particularly with Microsoft operating systems. Created by MIT and derives its name from the mythical three headed dog. The is a great deal of verification for the tickets and the tickets expire quickly. Client authenticates to the Authentication Server once using a long term shared secret and receives back a Ticket-Granting Server. Client can reuse this ticket to get additional tickets without reusing the shared secret. These tickets are used to prove authentication to the Service Server.

Become a Premium Member for full access
  Unlock Premium Member
Total 206 questions
Go to page: of 21

Related questions