Pass the ECCouncil ECES 212-81 Questions and answers with CertsForce

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.

Options:

A.

CLR


B.

OCSP


C.

TLS


D.

IPSec


Expert Solution
Questions # 22:

What is the basis for the FISH algorithm?

Options:

A.

The Lagged Fibonacci generator


B.

Prime number theory


C.

Equations that describe an ellipse


D.

The difficulty in factoring numbers


Expert Solution
Questions # 23:

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.

Options:

A.

PKI


B.

GOST


C.

CA


D.

PIKE


Expert Solution
Questions # 24:

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

Options:

A.

SHA2


B.

MD5


C.

MD4


D.

PIKE


Expert Solution
Questions # 25:

Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?

Options:

A.

160


B.

512


C.

256


D.

128


Expert Solution
Questions # 26:

Which of the following is an asymmetric algorithm that was first publically described in 1977?

Options:

A.

Elliptic Curve


B.

Twofish


C.

DESX


D.

RSA


Expert Solution
Questions # 27:

Which algorithm implements an unbalanced Feistel cipher?

Options:

A.

Skipjack


B.

RSA


C.

3DES


D.

Blowfish


Expert Solution
Questions # 28:

If you XOR 10111000 with 10101010, what is the result?

Options:

A.

10111010


B.

10101010


C.

11101101


D.

00010010


Expert Solution
Questions # 29:

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?

Options:

A.

Elliptic Curve


B.

NMD5


C.

RSA


D.

Diffie-Hellman


Expert Solution
Questions # 30:

The ATBASH cipher is best described as what type of cipher?

Options:

A.

Asymmetric


B.

Symmetric


C.

Substitution


D.

Transposition


Expert Solution
Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions