Share all information about certification and examination!
Forums
Members
Recent Posts
Forums
Dumps Discussion
EC-Council
212-81
Notifications
Clear all
212-81
Share and discuss the opinions about the dumps with all 212-81 Q&As.
RSS
Page 1 / 4
1
2
3
4
Next
Topic Title
Views
Posts
Participants
The mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.
Coy
, 1 year ago
99
1
No replies
DES has a key space of what?
Isaiah
, 1 year ago
107
1
No replies
This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypte
Nathaniel
, 1 year ago
127
1
No replies
What is the definition of breaking a cipher?
Ernest
, 1 year ago
101
1
No replies
If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.
Manual
, 1 year ago
96
1
No replies
A simple algorithm that will take the initial key and from that generate a slightly different key each round.
Morgan
, 1 year ago
87
1
No replies
Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?
Esteban
, 1 year ago
71
1
No replies
The concept that if one bit of data changes, the cipher text will all completely change as well.
Thurman
, 1 year ago
82
1
No replies
Encryption of the same plain text with the same key results in the same cipher text. Use of an IV that is XORed with the first block of plain text solves this problem.
Ali
, 1 year ago
71
1
No replies
Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?
Jacques
, 1 year ago
90
1
No replies
What are the two modes of IPSec?
Philip
, 1 year ago
95
1
No replies
Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.
Mauro
, 1 year ago
77
1
No replies
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?
Carmelo
, 1 year ago
86
1
No replies
A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
Coy
, 1 year ago
102
1
No replies
MD5 can best be described as which one of the following?
Gonzalo
, 1 year ago
84
1
No replies
Which one of the following most accurately defines encryption?
Chas
, 1 year ago
75
1
No replies
Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?
Thurman
, 1 year ago
76
1
No replies
Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.
Mauro
, 1 year ago
102
1
No replies
Which service in a PKI will vouch for the identity of an individual or company?
Giovanni
, 1 year ago
74
1
No replies
A non-secret binary vector used as the initializing input algorithm for encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.
Dante
, 1 year ago
102
1
No replies
A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.
Harris
, 1 year ago
83
1
No replies
In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed
Morgan
, 1 year ago
77
1
No replies
What size block does FORK256 use?
Isaiah
, 1 year ago
85
1
No replies
A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.
Vicente
, 1 year ago
80
1
No replies
Which of the following acts as a verifier for the certificate authority?
Cletus
, 1 year ago
79
1
No replies
In 1977 researchers and MIT described what asymmetric algorithm?
Nathaniel
, 1 year ago
79
1
No replies
Which of the following are valid key sizes for AES (choose three)?
Theo
, 1 year ago
133
1
No replies
Which of the following is the successor of SSL?
Tuan
, 1 year ago
83
1
No replies
Which of the following is an asymmetric algorithm that was first publically described in 1977?
Chas
, 1 year ago
85
1
No replies
What is an s-box?
Chas
, 1 year ago
81
1
No replies
Page 1 / 4
1
2
3
4
Next
Share: