Free Certified Encryption Specialist Exam 212-81 Exam Practice Test
212-81 Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 199
-
Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.
Answer: C Next Question -
Numbers that have no factors in common with another.
Answer: C Next Question -
This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.
Answer: B Next Question -
The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.
Answer: A Next Question -
Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?
Answer: D Next Question -
The time and effort required to break a security measure.
Answer: B Next Question -
Which of the following is generally true about key sizes?
Answer: A Next Question -
Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?
Answer: D Next Question -
This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.
Answer: D Next Question -
You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RS
Answer: C Next Question
Total Questions: 199
