Pass the ECCouncil ECES 212-81 Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following is used to encrypt email and create digital signatures?

Options:

A.

DES


B.

SHA1


C.

AES


D.

RSA


Expert Solution
Questions # 32:

The most common way steganography is accomplished is via which one of the following?

Options:

A.

rsb


B.

Isb


C.

msb


D.

asb


Expert Solution
Questions # 33:

What type of encryption uses different keys to encrypt and decrypt the message?

Options:

A.

Asymmetric


B.

Symmetric


C.

Secure


D.

Private key


Expert Solution
Questions # 34:

Which of the following is a key exchange protocol?

Options:

A.

MQV


B.

AES


C.

DES


D.

RSA


Expert Solution
Questions # 35:

The most widely used asymmetric encryption algorithm is what?

Options:

A.

Vigenere


B.

Caesar Cipher


C.

RSA


D.

DES


Expert Solution
Questions # 36:

Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 ≤ Xi ≤ m.

Options:

A.

Lehmer Random Number Generator


B.

Lagged Fibonacci Generator


C.

Linear Congruential Generator


D.

Blum Blum Shub


Expert Solution
Questions # 37:

All of the following are key exchange protocols except for____

Options:

A.

MQV


B.

AES


C.

ECDH


D.

DH


Expert Solution
Questions # 38:

If you use substitution alone, what weakness is present in the resulting cipher text?

Options:

A.

It is the same length as the original text


B.

It is easily broken with modern computers


C.

It maintains letter and word frequency


D.

It is too simple


Expert Solution
Questions # 39:

What does the OCSP protocol provide?

Options:

A.

Revoked certificates


B.

Hashing


C.

VPN connectivity


D.

Encryption


Expert Solution
Questions # 40:

A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.

Options:

A.

TIGER


B.

GOST


C.

MD5


D.

MD6


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions