ECCouncil 212-81 Practice Test - Questions Answers, Page 9

List of questions
Question 81

The most widely used asymmetric encryption algorithm is what?
Question 82

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?
Question 83

A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.
Question 84

A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.
Question 85

Which one of the following are characteristics of a hash function? (Choose two)
Question 86

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?
Question 87

How did the ATBASH cipher work?
Question 88

Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.
Question 89

Encryption of the same plain text with the same key results in the same cipher text. Use of an IV that is XORed with the first block of plain text solves this problem.
Question 90

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.
Question