ECCouncil 212-81 - EC-Council Certified Encryption Specialist (ECES)
What does the OCSP protocol provide?
Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
What best describes the shifting of each letter a fixed number of spaces to the left or right?
John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?
Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.
MD5 can best be described as which one of the following?
3DES can best be classified as which one of the following?
Which one of the following is a symmetric key system using 64-bit blocks?
When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?