ECCouncil 212-81 Practice Test - Questions Answers, Page 6
List of questions
Question 51
A real time protocol for verifying certificates (and a newer method than CRL).
Question 52
Which of the following is not a key size used by AES?
Question 53
Which one of the following is an authentication method that sends the username and password in cleartext?
Question 54
A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
Question 55
Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?
Question 56
A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.
Question 57
What size block does FORK256 use?
Question 58
Which of the following algorithms uses three different keys to encrypt the plain text?
Question 59
Original, unencrypted information is referred to as ____.
Question 60
Which of the following is a block cipher?
Question