Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-81 Exam - Topic 12 Question 52 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 52
Topic #: 12
[All 212-81 Questions]

Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Quentin
4 months ago
MD5 is still used a lot, but it's not secure anymore.
upvoted 0 times
...
Shawnda
5 months ago
I think SHA-1 is more popular these days, though.
upvoted 0 times
...
Galen
5 months ago
Wait, Flame malware compromised it? That's wild!
upvoted 0 times
...
Mitzie
5 months ago
Totally agree, MD4 was a weak predecessor!
upvoted 0 times
...
Rashida
5 months ago
Hash was indeed created by Ronald Rivest.
upvoted 0 times
...
Dorothy
6 months ago
I feel like the details about the block size and rounds might point to TIGER, but I need to double-check my notes on that.
upvoted 0 times
...
Cora
6 months ago
The 64 rounds make me think of SHA-1, but I also remember that Keccak is a newer standard.
upvoted 0 times
...
Crista
6 months ago
I remember studying that MD5 was replaced by something more secure, but I can't recall if it was SHA-1 or something else.
upvoted 0 times
...
France
6 months ago
I think the hash described sounds a lot like SHA-1, but I'm not entirely sure about the specifics like the output size.
upvoted 0 times
...
Lon
6 months ago
Ah, I remember learning about this hash function in class. The details match up with MD5, so I'm confident that's the right answer. Time to move on to the next question.
upvoted 0 times
...
Jutta
6 months ago
Okay, let's see. 128-bit output, 512-bit block, 32-bit word, 64 rounds - that sounds like SHA-1 to me. But I'll double-check the other options just to be sure.
upvoted 0 times
...
Tom
6 months ago
Hmm, I'm a bit unsure about this one. The info about the Flame malware compromise has me second-guessing my initial instinct. I'll have to think this through carefully.
upvoted 0 times
...
Laura
6 months ago
This one seems pretty straightforward. The details about the hash function's creator, output size, and block size are good clues to identify it.
upvoted 0 times
...
Kayleigh
11 months ago
Wait, is this a trick question? I thought we were supposed to be learning about hash functions, not guessing which one is the most hilariously outdated.
upvoted 0 times
Krissy
10 months ago
C) SHA-1
upvoted 0 times
...
Mitzie
10 months ago
B) MD5
upvoted 0 times
...
Olga
11 months ago
A) Keccak
upvoted 0 times
...
...
Cordelia
11 months ago
TIGER, all the way! It's got a cool name, and who doesn't love a good tiger? Plus, it's probably super secure, right?
upvoted 0 times
Cathern
10 months ago
I agree, SHA-1 is definitely more secure than TIGER.
upvoted 0 times
...
Donte
10 months ago
I think SHA-1 is a better option in terms of security.
upvoted 0 times
...
Jesus
10 months ago
TIGER, all the way! It's got a cool name, and who doesn't love a good tiger? Plus, it's probably super secure, right?
upvoted 0 times
...
Laticia
10 months ago
D) TIGER
upvoted 0 times
...
Dianne
10 months ago
C) SHA-1
upvoted 0 times
...
Aaron
10 months ago
B) MD5
upvoted 0 times
...
Noelia
11 months ago
A) Keccak
upvoted 0 times
...
...
Lynelle
12 months ago
Keccak, for sure. I mean, it's not like the question is asking about hash functions that are actually used in the real world, is it?
upvoted 0 times
Pamela
10 months ago
B) MD5
upvoted 0 times
...
Ronna
10 months ago
D) TIGER
upvoted 0 times
...
Carmelina
10 months ago
C) SHA-1
upvoted 0 times
...
Brice
11 months ago
A) Keccak
upvoted 0 times
...
...
Ula
12 months ago
I'm not sure, but I think D) TIGER could also be a possibility.
upvoted 0 times
...
Asuncion
12 months ago
I agree with Danilo, SHA-1 seems like the most logical choice given the description.
upvoted 0 times
...
Zona
1 year ago
SHA-1, obviously. It's been around for ages, and it's not like anyone would actually use it for anything important nowadays, right?
upvoted 0 times
Rusty
11 months ago
D) TIGER
upvoted 0 times
...
Katie
11 months ago
C) SHA-1
upvoted 0 times
...
Lisbeth
11 months ago
A) Keccak
upvoted 0 times
...
...
Ivan
1 year ago
Definitely MD5! It's a classic, even if it's been compromised. Maybe the Flame malware was just a prank, right?
upvoted 0 times
Fannie
10 months ago
I agree, let's go with SHA-1 for better security.
upvoted 0 times
...
Francis
10 months ago
Yeah, MD5 is too risky after the compromise.
upvoted 0 times
...
Felix
10 months ago
I think SHA-1 is a better option now.
upvoted 0 times
...
Anthony
10 months ago
D) TIGER
upvoted 0 times
...
Simona
10 months ago
C) SHA-1
upvoted 0 times
...
Noble
11 months ago
B) MD5
upvoted 0 times
...
Dick
11 months ago
A) Keccak
upvoted 0 times
...
...
Danilo
1 year ago
I think the answer is C) SHA-1.
upvoted 0 times
...

Save Cancel