ECCouncil 212-81 Practice Test - Questions Answers, Page 6

List of questions
Question 51

A real time protocol for verifying certificates (and a newer method than CRL).
Question 52

Which of the following is not a key size used by AES?
Question 53

Which one of the following is an authentication method that sends the username and password in cleartext?
Question 54

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
Question 55

Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?
Question 56

A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.
Question 57

What size block does FORK256 use?
Question 58

Which of the following algorithms uses three different keys to encrypt the plain text?
Question 59

Original, unencrypted information is referred to as ____.
Question 60

Which of the following is a block cipher?
Question