ECCouncil 212-81 - EC-Council Certified Encryption Specialist (ECES)
Which of the following equations is related to EC?
Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
Which of the following is the successor of SSL?
Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?
What size block does FORK256 use?
What is a "Collision attack" in cryptography?
The time and effort required to break a security measure.
What is the solution to the equation 8 mod 3?
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
Ahlen is using a set of pre-calculated hashes to attempt to derive the passwords from a Windows SAM file. What is a set of pre-calculated hashes used to derive a hashed password called?