Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-81 Topic 5 Question 21 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 21
Topic #: 5
[All 212-81 Questions]

What type of encryption uses different keys to encrypt and decrypt the message?

Show Suggested Answer Hide Answer
Suggested Answer: C

Brute force

https://en.wikipedia.org/wiki/Brute-force_attack

A brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search.

A brute-force attack is a cryptanalytic attack that can, in theory, be used to attempt to decrypt any encrypted data (except for data encrypted in an information-theoretically secure manner). Such an attack might be used when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier.

Incorrect answers:

Rainbow tables -is a precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a key derivation function (or credit card numbers, etc.) up to a certain length consisting of a limited set of characters.

Dictionary attack -is a form of brute force attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying thousands or millions of likely possibilities, such as words in a dictionary or previously used passwords, often from lists obtained from past security breaches.

Shoulder surfing -is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder, either from keystrokes on a device or sensitive information being spoken and heard, also known as eavesdropping.


Contribute your Thoughts:

Jesusa
2 months ago
As a professional hacker, I can tell you that asymmetric encryption is the only way to go if you want to keep your messages truly secure. No 'private key' shenanigans here!
upvoted 0 times
...
Hobert
2 months ago
Hah, 'Secure' and 'Private key'? Sounds like someone's trying to trick us. Asymmetric is the only way to encrypt and decrypt with different keys.
upvoted 0 times
Definitely, asymmetric encryption is the most secure option.
upvoted 0 times
...
Naomi
5 days ago
Symmetric encryption is good too, but asymmetric is more secure.
upvoted 0 times
...
Rosamond
6 days ago
Yeah, using different keys for encryption and decryption adds an extra layer of security.
upvoted 0 times
...
Rory
10 days ago
I agree, asymmetric encryption is the way to go.
upvoted 0 times
...
...
Elena
2 months ago
Secure and private key sound like they could be right, but those aren't the technical terms. Asymmetric is the way to go here.
upvoted 0 times
Glen
1 months ago
So, the answer is A) Asymmetric.
upvoted 0 times
...
Ira
2 months ago
Yeah, asymmetric encryption uses different keys for encryption and decryption.
upvoted 0 times
...
Clorinda
2 months ago
I think it's asymmetric.
upvoted 0 times
...
...
Man
2 months ago
Symmetric encryption uses the same key for both encryption and decryption. Gotta be asymmetric for this one.
upvoted 0 times
...
Hobert
2 months ago
Ooh, this one's tricky! Asymmetric encryption, definitely. I remember learning about public and private keys in my crypto class.
upvoted 0 times
Lisha
28 days ago
B) Symmetric
upvoted 0 times
...
Veronique
30 days ago
That's correct! Asymmetric encryption uses different keys for encryption and decryption.
upvoted 0 times
...
Winifred
1 months ago
A) Asymmetric
upvoted 0 times
...
...
Sanda
3 months ago
I agree with Rebbeca, asymmetric encryption is more secure as it uses separate keys for encryption and decryption.
upvoted 0 times
...
Rebbeca
3 months ago
I think it's A) Asymmetric because it uses different keys for encryption and decryption.
upvoted 0 times
...
Tess
3 months ago
A) Asymmetric encryption
upvoted 0 times
...
Sarah
3 months ago
A) Asymmetric is more secure as it involves a public and private key pair.
upvoted 0 times
...
Bettina
3 months ago
B) Symmetric is not the answer because it uses the same key for both encryption and decryption.
upvoted 0 times
...
Aleisha
3 months ago
A) Asymmetric because it uses different keys for encryption and decryption.
upvoted 0 times
...

Save Cancel
a