Which of the following is an asymmetric algorithm that was first publically described in 1977?
If you use substitution alone, what weakness is present in the resulting cipher text?
This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.
Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.
Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?
Which of the following is an asymmetric cipher?
Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?
Which one of the following is an authentication method that sends the username and password in cleartext?
How did the ATBASH cipher work?
With Electronic codebook (ECB) what happens:
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
ECCouncil Free Exams |
---|
![]() |