The most common way steganography is accomplished is via which one of the following?
A. rsb
B. Isb
C. msb
D. asb
A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.
A. Total Break
B. Distinguishing Algorithm
C. Instance Deduction
D. Information Deduction
Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?
A. Cryptography
B. Steganalysis
C. Cryptology
D. Steganography
The Clipper chip is notable in the history of cryptography for many reasons. First, it was designed for civilian used secure phones. Secondly, it was designed to use a very specific symmetric cipher. Which one of the following was originally designed to provide built-in cryptography for the Clipper chip?
A. Blowfish
B. Twofish
C. Skipjack
D. Serpent
Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?
A. SHA2
B. MD5
C. MD4
D. PIKE
If you wished to see a list of revoked certificates from a CA, where would you look?
A. RA
B. RFC
C. CRL
D. CA
Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?
A. K4
B. K5
C. K3
D. K2
E. K1
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?
A. Key distribution
B. Security
C. Scalability
D. Speed
During the process of encryption and decryption, what keys are shared?
A. Public keys
B. Public and private keys
C. User passwords
D. Private keys
Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.
A. Cipher disk
B. Caesar cipher
C. Scytale
D. Enigma machine
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-81 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.