Pass the ECCouncil ECES 212-81 Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).

Options:

A.

Odd numbers


B.

Fibonacci Sequence


C.

Fermat pseudoprime


D.

Prime numbers


Expert Solution
Questions # 42:

A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed

Options:

A.

Туре 1


B.

Туре 4


C.

Туре 2


D.

Туре 3


Expert Solution
Questions # 43:

Which of the following equations is related to EC?

Options:

A.

P = Cd%n


B.

Me%n


C.

y^2 = x^3 + Ax + B


D.

Let m = (p-1)(q-1)


Expert Solution
Questions # 44:

The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.

Options:

A.

ElGamal


B.

RSA


C.

PAP


D.

X.509


Expert Solution
Questions # 45:

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

Options:

A.

IPsec Policy Agent


B.

Internet Key Exchange (IKE)


C.

Oakley


D.

IPsec driver


Expert Solution
Questions # 46:

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ________ integrity check mechanism provides security against a replay attack.

Options:

A.

CBC-MAC


B.

CRC-MAC


C.

CRC-32


D.

CBC-32


Expert Solution
Questions # 47:

During the process of encryption and decryption, what keys are shared?

Options:

A.

Public keys


B.

Public and private keys


C.

User passwords


D.

Private keys


Expert Solution
Questions # 48:

3DES can best be classified as which one of the following?

Options:

A.

Digital signature


B.

Symmetric algorithm


C.

Asymmetric algorithm


D.

Hashing algorithm


Expert Solution
Questions # 49:

A measure of the uncertainty associated with a random variable.

Options:

A.

Collision


B.

Whitening


C.

Diffusion


D.

Entropy


Expert Solution
Questions # 50:

What is the largest key size that AES can use?

Options:

A.

256


B.

56


C.

512


D.

128


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions