ExamGecko
Home / ECCouncil / 212-81 / List of questions
Ask Question

ECCouncil 212-81 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

The most widely used asymmetric encryption algorithm is what?

Become a Premium Member for full access
  Unlock Premium Member

Question 82

Report Export Collapse

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?

Become a Premium Member for full access
  Unlock Premium Member

Question 83

Report Export Collapse

A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.

Become a Premium Member for full access
  Unlock Premium Member

Question 84

Report Export Collapse

A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.

Become a Premium Member for full access
  Unlock Premium Member

Question 85

Report Export Collapse

Which one of the following are characteristics of a hash function? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 86

Report Export Collapse

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

Become a Premium Member for full access
  Unlock Premium Member

Question 87

Report Export Collapse

How did the ATBASH cipher work?

Become a Premium Member for full access
  Unlock Premium Member

Question 88

Report Export Collapse

Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.

Become a Premium Member for full access
  Unlock Premium Member

Question 89

Report Export Collapse

Encryption of the same plain text with the same key results in the same cipher text. Use of an IV that is XORed with the first block of plain text solves this problem.

Become a Premium Member for full access
  Unlock Premium Member

Question 90

Report Export Collapse

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

Become a Premium Member for full access
  Unlock Premium Member
Total 206 questions
Go to page: of 21
Search

Related questions