DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. EC-COUNCIL
  3. Certified Encryption Specialist
  4. EC-COUNCIL.212-81.v2024-06-09.q86
  5. Question 1

Join the discussion

Question 1/86

What is a "Collision attack" in cryptography?

Correct Answer: D
Collision attacks try to find two inputs producing the same
https://en.wikipedia.org/wiki/Collision_attack
A collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast to a preimage attack where a specific target hash value is specified.

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (86q)
Q1. What is a "Collision attack" in cryptography?
Q2. Which of the following is a substitution cipher used by ancient Hebrew scholars?...
Q3. What is the name of the attack where the attacker obtains the ciphertexts corresponding to...
Q4. If the round function is a cryptographically secure pseudorandom function, then ___rounds ...
Q5. What is the solution to the equation 8 mod 3?
Q6. A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used...
Q7. Which of the following is an asymmetric cipher?...
Q8. Storing private keys with a third party is referred to as what?...
Q9. An attack that is particularly successful against block ciphers based on substitution-perm...
Q10. If Bob is using asymmetric cryptography and wants to send a message to Alice so that only ...
Q11. Collision resistance is an important property for any hashing algorithm. Joan wants to fin...
Q12. Which of the following is not a key size used by AES?...
Q13. Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIP...
Q14. You have been tasked with selecting a digital certificate standard for your company to use...
Q15. A ______ refers to a situation where two different inputs yield the same output....
Q16. Original, unencrypted information is referred to as ____....
Q17. Which of the following is an asymmetric algorithm that was first publically described in 1...
Q18. Which one of the following uses three different keys, all of the same size?...
Q19. Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block...
Q20. Which of the following is a fundamental principle of cryptography that holds that the algo...
Q21. In a ______ the attacker discovers a functionally equivalent algorithm for encryption and ...
Q22. Why is quantum computing a threat to RSA?
Q23. In a Feistel cipher, the two halves of the block are swapped in each round. What does this...
Q24. Ferris has been assigned the task of selecting security for his company's wireless network...
Q25. Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W....
Q26. This hash function uses 512-bit blocks and implements preset constants that change after e...
Q27. Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another m...
Q28. Cryptographic hashes are often used for message integrity and password storage. It is impo...
Q29. Bruce Schneier is a well-known and highly respected cryptographer. He has developed severa...
Q30. John is trying to select the appropriate authentication protocol for his company. Which of...
Q31. Ciphers that write message letters out diagonally over a number of rows then read off ciph...
Q32. The greatest weakness with symmetric algorithms is _____....
Q33. Which one of the following is an example of a symmetric key algorithm?...
Q34. If you wished to see a list of revoked certificates from a CA, where would you look?...
Q35. Uses a formula, M_n = 2^n − 1 where n is a prime number, to generate primes. Works for 2,...
Q36. A real time protocol for verifying certificates (and a newer method than CRL)....
Q37. Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input m...
Q38. What must occur in order for a cipher to be considered 'broken'?...
Q39. Numbers that have no factors in common with another....
Q40. A number that is used only one time, then discarded is called what?...
Q41. A part of understanding symmetric cryptography understands the modes in which it can be us...
Q42. Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used pu...
Q43. What size key does Skipjack use?
Q44. The most widely used digital certificate standard. First issued July 3, 1988. It is a digi...
Q45. A list of certificates that have been revoked....
Q46. In a Feistel cipher, the two halves of the block are swapped in each round. What does this...
Q47. All of the following are key exchange protocols except for____...
Q48. Changing some part of the plain text for some matching part of cipher text. Historical alg...
Q49. Which of the following acts as a verifier for the certificate authority?...
Q50. A cryptanalysis success where the attacker deduces the secret key....
Q51. What size block does FORK256 use?
Q52. During the process of encryption and decryption, what keys are shared?...
Q53. A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel ...
Q54. Which of the following is generally true about key sizes?...
Q55. Which of the following is a block cipher?
Q56. Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another m...
Q57. What is an IV?
Q58. In order to understand RSA. you must understand the key generation algorithm as well as th...
Q59. Which component of IPsec performs protocol-level functions that are required to encrypt an...
Q60. ____________cryptography uses one key to encrypt a message and a different key to decrypt ...
Q61. Which of the following is the successor of SSL?...
Q62. Which one of the following best describes a process that splits the block of plaintext int...
Q63. Terrance oversees the key escrow server for his company. All employees use asymmetric cryp...
Q64. Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted r...
Q65. A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement...
Q66. You are explaining the details of the AES algorithm to cryptography students. You are disc...
Q67. Which one of the following is a component of the PKI?...
Q68. When learning algorithms, such as RSA, it is important to understand the mathematics being...
Q69. What size block does AES work on?
Q70. A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modif...
Q71. What is a variation of DES that uses a technique called Key Whitening?...
Q72. In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the followi...
Q73. _____ uses at least two different shifts, changing the shift with different letters in the...
Q74. A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into ...
Q75. Bob's password is hashed, and so is John's. Even though they used different passwords, the...
Q76. Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 ...
Q77. How can rainbow tables be defeated?
Q78. You are trying to find a modern method for security web traffic for use in your company's ...
Q79. A _______ product refers to an NSA-endorsed classified or controlled cryptographic item fo...
Q80. Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century...
Q81. Which of the following algorithms uses three different keys to encrypt the plain text?...
Q82. John is going to use RSA to encrypt a message to Joan. What key should he use?...
Q83. Which of the following uses an 80 bit key on 64 bit blocks?...
Q84. Encryption of the same plain text with the same key results in the same cipher text. Use o...
Q85. Which analysis type is based on the statistics of the numbers of unique colors and close-c...
Q86. Basic information theory is the basis for modern symmetric ciphers. Understanding the term...
[×]

Download PDF File

Enter your email address to download EC-COUNCIL.212-81.v2024-06-09.q86.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.