ECCouncil 212-81 Practice Test - Questions Answers, Page 6
List of questions
Related questions
A real time protocol for verifying certificates (and a newer method than CRL).
Which of the following is not a key size used by AES?
Which one of the following is an authentication method that sends the username and password in cleartext?
A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?
A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.
Which of the following algorithms uses three different keys to encrypt the plain text?
Original, unencrypted information is referred to as ____.
Question