Free 212-81 Exam Braindumps (page: 12)

Page 12 of 50

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?

  1. Vigenere's principle
  2. Shamir's principle
  3. Kerkchoff's principle
  4. Babbage's principle

Answer(s): C

Explanation:

Kerkchoff's principle
https://en.wikipedia.org/wiki/Kerckhoffs%27s_principle
Kerckhoffs's principle (also called Kerckhoffs's desideratum, assumption, axiom, doctrine or law) of cryptography was stated by Netherlands born cryptographer Auguste Kerckhoffs in the 19th century: A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.
Kerckhoffs's principle was reformulated (or possibly independently formulated) by American mathematician Claude Shannon as "the enemy knows the system", i.e., "one ought to design systems under the assumption that the enemy will immediately gain full familiarity with them". In that form, it is called Shannon's maxim. This concept is widely embraced by cryptographers, in contrast to "security through obscurity", which is not.



A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.

  1. Chosen Plaintext Attack
  2. Steganography
  3. Rainbow Tables
  4. Transposition

Answer(s): A

Explanation:

Chosen Plaintext Attack https://en.wikipedia.org/wiki/Chosen-plaintext_attack
A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts. The goal of the attack is to gain information that reduces the security of the encryption scheme.

Incorrect answers:
Rainbow Tables - precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes.
Transposition - swapping blocks of text.
Steganography - the practice of concealing a file, message, image, or video within another file, message, image, or video.



A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.

  1. Registration Authority
  2. Payload
  3. OCSP
  4. Digital Certificate

Answer(s): D

Explanation:

Digital Certificate
https://en.wikipedia.org/wiki/Public_key_certificate
A public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key. The certificate includes information about the key, information about the identity of its owner (called the subject), and the digital signature of an entity that has verified the certificate's contents (called the issuer).

Incorrect answers:
OCSP - Provides certificate validation in real time and will let you know if it is valid or has been revoked.
Registration Authority (RA) - component of PKI that validates the identity of an entity requesting a digital certificate.
Payload - In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message. Headers and metadata are sent only to enable payload delivery. In the steganography - information to be concealed and sent secretly, or the data covertly communicated;



Which one of the following are characteristics of a hash function? (Choose two)

  1. Requires a key
  2. One-way
  3. Fixed length output
  4. Symmetric
  5. Fast

Answer(s): B,C

Explanation:

Correct answers: One-way, Fixed length output https://en.wikipedia.org/wiki/Cryptographic_hash_function
A cryptographic hash function is a mathematical algorithm that maps data of arbitrary size (often called the "message") to a bit array of a fixed size (the "hash value", "hash", or "message digest"). It is a one-way function, that is, a function which is practically infeasible to invert. Incorrect answers:
Symmetric. Cryptographic algorithms can be categorized into three classes: Hash functions, Symmetric and Asymmetric algorithms. Differences: purpose and main fields of application.
Requires a key. Well, technically, this is the correct answer. But in the hash-function, “key” is input data.
Fast. Fast or slow is a subjective characteristic, there are many different algorithms, and here it is impossible to say this unambiguously like "Symmetric encryption is generally faster than asymmetric encryption."



Page 12 of 50



Post your Comments and Discuss EC-Council 212-81 exam with other Community members:

Judwa commented on September 26, 2024
This exam is super hard. I was overwhelmed. After using this exam dump, I went into the exam feeling a bit better. I passed my test. :-)
INDIA
upvote

Jubran commented on September 26, 2024
Clear explanations and well-structured content made it so much easier to prepare and pass.
UNITED STATES
upvote

KXK commented on September 26, 2024
The study guide was concise yet comprehensive. It helped me focus on the key topics and feel more prepared than ever!
INDIA
upvote

Chandra commented on September 26, 2024
I passed my exam with ease, thanks to the targeted material in this guide. It made a huge difference in how I prepared.
CANADA
upvote

raba commented on September 26, 2024
I was thinking question 16 should be a legacy systems
Anonymous
upvote

Bubba commented on September 26, 2024
Good work guys. The layout is user-friendly, and the content is spot on.
Hong Kong
upvote

rabihu commented on September 26, 2024
These are really challenging questions.i love it
Anonymous
upvote

Murad commented on September 26, 2024
This guide gave me the exact focus I needed to pass my exam on the first try. Highly effective and reliable.
Turkey
upvote

raba commented on September 26, 2024
these are really good questions
Anonymous
upvote

Kg commented on September 26, 2024
hi @phil , thank you for the response , basically i must just check wether the answers are correct
Anonymous
upvote

Alhassan commented on September 26, 2024
these are really good questions
Anonymous
upvote

Jose commented on September 26, 2024
these are really good questions
Anonymous
upvote

David commented on September 26, 2024
good Questions
Anonymous
upvote

Mohammed commented on September 26, 2024
Absolutely grateful for this exam dumps. Passed on the first set down.
France
upvote

Phil commented on September 26, 2024
Hi @kg I feel you. Based on my experience, the questions are valid but some of the answers were not accurate. So I managed to study and kinda figure these answers. For me the accuracy of the questions were more important and I saw most of them in the exam.
Anonymous
upvote

Madhan commented on September 26, 2024
Useful questions
INDIA
upvote

Owol Sentmi commented on September 26, 2024
great Questions
Anonymous
upvote

Noha commented on September 26, 2024
Feeling very confident now. Went over the free questions here then decided to buy the full PDF and test engine with the sale price and now ready to write my test. Will share my experience next week after I go for my exam. Wish me luck guys.
UNITED STATES
upvote

Baylis commented on September 26, 2024
I am certified now. Thank you team.
UNITED STATES
upvote

Harper commented on September 26, 2024
If you have access to full version of this exam dumps then you are good to go and pass your exam.
EUROPEAN UNION
upvote

Suil commented on September 26, 2024
Very good Practice questions
CHINA
upvote

lala commented on September 26, 2024
really helping
Anonymous
upvote

Champ commented on September 26, 2024
Good to see that something is still free. I truly appreciate this service.
Mexico
upvote

kg commented on September 26, 2024
anyone who sees this comment please respond to my question, can the answers on freedumps be trusted , because im using different materials also from exam topics and the answers dont look the same
Anonymous
upvote

Shams commented on September 25, 2024
This exam is valid in UAE. I passed.
UNITED ARAB EMIRATES
upvote

rb commented on September 25, 2024
these are really good questions
Anonymous
upvote

Muhammad Saleem commented on September 25, 2024
In which Service Studio layer can Entities be found? I think Answer should be Data but It's Interface
UNITED ARAB EMIRATES
upvote

Khoshal commented on September 25, 2024
@Emily I have taken this exam and yes it is hard. But I managed to pass this exam with some study and using the questions from this exam dumps. I would say about 80% more or less of these questions are in the exam.
INDIA
upvote

Emily commented on September 25, 2024
I understand that most users reported that this exam is very hard. But how much of these questions were present in the exam if anyone has taken the exam? Please share.
Hong Kong
upvote

john commented on September 25, 2024
these are really good ques
Anonymous
upvote

Catho commented on September 25, 2024
I blindly trusted this site and purchased the full version. Well I am happy I did. Now I acquired my certificate and pass my exam.
EUROPEAN UNION
upvote

Gorbender commented on September 25, 2024
There are some new questions in this exam which are not present in this exam dumps. But about 75 to 80% of the questions are there. It was enough for me to pass.
INDIA
upvote

Nik commented on September 25, 2024
Wonderful service and content. Thank you for giving me the 50% discount.
GERMANY
upvote

khalil commented on September 25, 2024
question number 5 is wrong, we serialize and deserialize json using strigify and parse please pay attention to the answers provided
Anonymous
upvote