Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?
A. PIKE
B. Twofish
C. RC4
D. Blowfish
What best describes the shifting of each letter a fixed number of spaces to the left or right?
A. Single substitution
B. Multi substitution
C. XOR
D. Bit shifting
DES has a key space of what?
A. 2^128
B. 2^192
C. 2^64
D. 2^56
Which of the following is generally true about key sizes?
A. Larger key sizes increase security
B. Key size is irrelevant to security
C. Key sizes must be more than 256 bits to be secure
D. Smaller key sizes increase security
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
A. Feistel
B. Asymmetric cipher
C. Symmetric cipher
D. Hash
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?
A. Complete diffusion
B. Complete scrambling
C. Complete confusion
D. Complete avalanche
Which of the following would be the fastest.
A. EC
B. DH
C. RSA
D. AES
Frank is trying to break into an encrypted file... He is attempting all the possible keys that could be used for this algorithm. Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?
A. Rainbow table
B. Frequency analysis
C. Brute force
D. Kasiski
Which one of the following best describes a process that splits the block of plaintext into two separate blocks, then applies the round function to one half, and finally swaps the two halves?
A. Block ciphers
B. Symmetric cryptography
C. Feistel cipher
D. Substitution cipher
The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.
A. Steganography
B. Cryptosystem
C. Avalanche effect
D. Key Schedule
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-81 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.