Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF 212-81 Study Guide

Page: 6 / 15
Total 206 questions

EC-Council Certified Encryption Specialist (ECES) Questions and Answers

Question 21

Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?

Options:

A.

160

B.

512

C.

256

D.

128

Question 22

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.

Options:

A.

Digital Signature

B.

Hash

C.

Ownership stamp

D.

Digest

Question 23

Which of the following is an asymmetric algorithm that was first publically described in 1977?

Options:

A.

Elliptic Curve

B.

Twofish

C.

DESX

D.

RSA

Question 24

An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.

Options:

A.

CHAP

B.

SPAP

C.

PAP

D.

EAP

Page: 6 / 15
Total 206 questions