This page was exported from Exams Labs Braindumps [ http://blog.examslabs.com ]
Export date: Thu Nov 7 7:25:20 2024 / +0000 GMT

Free EC-COUNCIL 212-81 Study Guides Exam Questions & Answer [Q43-Q65]




Free EC-COUNCIL 212-81 Study Guides Exam Questions and Answer

212-81 Exam Dumps, 212-81 Practice Test Questions

Q43. You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?

 
 
 
 
 
 

Q44. The most widely used asymmetric encryption algorithm is what?

 
 
 
 

Q45. Which of the following is an asymmetric cipher?

 
 
 
 

Q46. Developed by Netscape and has been replaced by TLS. It was the preferred method used with secure websites.

 
 
 
 

Q47. MD5 can best be described as which one of the following?

 
 
 
 

Q48. Which one of the following terms describes two numbers that have no common factors?

 
 
 
 

Q49. The Clipper chip is notable in the history of cryptography for many reasons. First, it was designed for civilian used secure phones. Secondly, it was designed to use a very specific symmetric cipher. Which one of the following was originally designed to provide built-in cryptography for the Clipper chip?

 
 
 
 

Q50. What does Output feedback (OFB) do:

 
 
 
 

Q51. Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.

 
 
 
 

Q52. If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?

 
 
 
 

Q53. Numbers that have no factors in common with another.

 
 
 
 

Q54. Message hidden in unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind.

 
 
 
 

Q55. Encryption of the same plain text with the same key results in the same cipher text. Use of an IV that is XORed with the first block of plain text solves this problem.

 
 
 
 

Q56. The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).

 
 
 
 

Q57. You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as

 
 
 
 

Q58. What is the solution to the equation 8 mod 3?

 
 
 
 

Q59. This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

 
 
 
 

Q60. Which of the following is a key exchange protocol?

 
 
 
 

Q61. With Cipher feedback (CFB) what happens?

 
 
 
 

Q62. John is trying to explain the basics of cryptography to a group of young, novice, security students. Which one of the following most accurately defines encryption?

 
 
 
 

Q63. Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.

 
 
 
 

Q64. Which of the following would be the fastest.

 
 
 
 

Q65. During the process of encryption and decryption, what keys are shared?

 
 
 
 

Latest 212-81 Actual Free Exam Questions Updated 200 Questions: https://www.examslabs.com/EC-COUNCIL/ECES/best-212-81-exam-dumps.html

Post date: 2022-11-20 09:18:43
Post date GMT: 2022-11-20 09:18:43
Post modified date: 2022-11-20 09:18:43
Post modified date GMT: 2022-11-20 09:18:43