ECCouncil 212-81 Practice Test - Questions Answers, Page 7
List of questions
Related questions
You are trying to find a modern method for security web traffic for use in your company's ecommerce web site. Which one of the following is used to encrypt web pages and uses bilateral authentication?
An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.
In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.
Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?
A linear congruential generator is an example of what?
John works as a cryptography consultant. He finds that people often misunderstand the reality of breaking a cipher. What is the definition of breaking a cipher?
_____ uses at least two different shifts, changing the shift with different letters in the plain text.
Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?
If you wished to see a list of revoked certificates from a CA, where would you look?
Question