Free 312-38 Exam Braindumps (page: 72)

Page 71 of 155

Which of the following is a symmetric 64-bit block cipher that can support key lengths up to 448 bits?

  1. HAVAL
  2. BLOWFISH
  3. IDEA
  4. XOR

Answer(s): B



Which of the following protocols is used to exchange encrypted EDI messages via email?

  1. S/MIME
  2. MIME
  3. HTTP
  4. HTTPS

Answer(s): A



Which of the following are provided by digital signatures?

  1. Identification and validation
  2. Authentication and identification
  3. Integrity and validation
  4. Security and integrity

Answer(s): B



Which of the following is a passive attack?

  1. Unauthorized access
  2. Traffic analysis
  3. Replay attack
  4. Session hijacking

Answer(s): B






Post your Comments and Discuss EC-Council 312-38 exam with other Community members:

312-38 Exam Discussions & Posts