ECCouncil 212-81 Practice Test - Questions Answers, Page 7

List of questions
Question 61

You are trying to find a modern method for security web traffic for use in your company's ecommerce web site. Which one of the following is used to encrypt web pages and uses bilateral authentication?
Question 62

An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.
Question 63

In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.
Question 64

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?
Question 65

A linear congruential generator is an example of what?
Question 66

DES has a key space of what?
Question 67

John works as a cryptography consultant. He finds that people often misunderstand the reality of breaking a cipher. What is the definition of breaking a cipher?
Question 68

_____ uses at least two different shifts, changing the shift with different letters in the plain text.
Question 69

Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?
Question 70

If you wished to see a list of revoked certificates from a CA, where would you look?
Question