ECCouncil 212-81 Practice Test - Questions Answers, Page 8
List of questions
Related questions
Which of the following are valid key sizes for AES (choose three)?
A cipher is defined as what
A measure of the uncertainty associated with a random variable.
Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?
Which of the following is a substitution cipher used by ancient Hebrew scholars?
A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.
Message hidden in unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind.
Cryptographic hashes are often used for message integrity and password storage. It is important to understand the common properties of all cryptographic hashes. What is not true about a hash?
John is going to use RSA to encrypt a message to Joan. What key should he use?
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
Question