New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-81 Exam - Topic 5 Question 21 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 21
Topic #: 5
[All 212-81 Questions]

What type of encryption uses different keys to encrypt and decrypt the message?

Show Suggested Answer Hide Answer
Suggested Answer: C

Brute force

https://en.wikipedia.org/wiki/Brute-force_attack

A brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search.

A brute-force attack is a cryptanalytic attack that can, in theory, be used to attempt to decrypt any encrypted data (except for data encrypted in an information-theoretically secure manner). Such an attack might be used when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier.

Incorrect answers:

Rainbow tables -is a precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a key derivation function (or credit card numbers, etc.) up to a certain length consisting of a limited set of characters.

Dictionary attack -is a form of brute force attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying thousands or millions of likely possibilities, such as words in a dictionary or previously used passwords, often from lists obtained from past security breaches.

Shoulder surfing -is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder, either from keystrokes on a device or sensitive information being spoken and heard, also known as eavesdropping.


Contribute your Thoughts:

0/2000 characters
Allene
3 months ago
Totally agree, Asymmetric is the way to go!
upvoted 0 times
...
Lashunda
3 months ago
Really? I always thought both types were the same.
upvoted 0 times
...
Nan
4 months ago
Asymmetric uses different keys, that's a fact.
upvoted 0 times
...
Fernanda
4 months ago
I thought it was Symmetric?
upvoted 0 times
...
Maryann
4 months ago
It's definitely Asymmetric encryption!
upvoted 0 times
...
Barbra
4 months ago
I’m a bit confused; I thought private key encryption was just another term for symmetric encryption.
upvoted 0 times
...
Ahmed
4 months ago
I feel like symmetric encryption uses the same key for both encrypting and decrypting, so that can't be the answer.
upvoted 0 times
...
Lore
5 months ago
I remember practicing a question about encryption types, and asymmetric was definitely the one with public and private keys.
upvoted 0 times
...
Lorrie
5 months ago
I think it's asymmetric encryption that uses different keys, but I'm not completely sure.
upvoted 0 times
...
Natalie
5 months ago
This seems like a tricky question. I'll need to think through the different options carefully.
upvoted 0 times
...
Latrice
5 months ago
Okay, let me see. The /etc/passwd file has the username, user ID, and default shell, that much I know. I'm guessing it also stores the user's storage space limit, but I'm not totally sure about that one.
upvoted 0 times
...
Timmy
5 months ago
Hmm, I'm a bit unsure about some of these options. I know we need to ensure high availability, but I'm not sure if all infrastructure components need redundancy. And what's the difference between SmartAccess and SmartControl? I'll need to review those features more closely.
upvoted 0 times
...
Ula
5 months ago
Ah, I see what they're getting at. The underlined text is incorrect - in a database table, each row represents a unique record, not each column. I'll select the answer that fixes that.
upvoted 0 times
...
Blondell
5 months ago
I've worked with Declarative Pipelines before, so I'm pretty confident about this. I'd say B and C are the right answers - stages contain steps, not the other way around.
upvoted 0 times
...
Jesusa
9 months ago
As a professional hacker, I can tell you that asymmetric encryption is the only way to go if you want to keep your messages truly secure. No 'private key' shenanigans here!
upvoted 0 times
...
Hobert
9 months ago
Hah, 'Secure' and 'Private key'? Sounds like someone's trying to trick us. Asymmetric is the only way to encrypt and decrypt with different keys.
upvoted 0 times
Lorita
8 months ago
Definitely, asymmetric encryption is the most secure option.
upvoted 0 times
...
Naomi
8 months ago
Symmetric encryption is good too, but asymmetric is more secure.
upvoted 0 times
...
Rosamond
8 months ago
Yeah, using different keys for encryption and decryption adds an extra layer of security.
upvoted 0 times
...
Rory
8 months ago
I agree, asymmetric encryption is the way to go.
upvoted 0 times
...
...
Elena
10 months ago
Secure and private key sound like they could be right, but those aren't the technical terms. Asymmetric is the way to go here.
upvoted 0 times
Glen
9 months ago
So, the answer is A) Asymmetric.
upvoted 0 times
...
Ira
9 months ago
Yeah, asymmetric encryption uses different keys for encryption and decryption.
upvoted 0 times
...
Clorinda
9 months ago
I think it's asymmetric.
upvoted 0 times
...
...
Man
10 months ago
Symmetric encryption uses the same key for both encryption and decryption. Gotta be asymmetric for this one.
upvoted 0 times
...
Hobert
10 months ago
Ooh, this one's tricky! Asymmetric encryption, definitely. I remember learning about public and private keys in my crypto class.
upvoted 0 times
Lisha
9 months ago
B) Symmetric
upvoted 0 times
...
Veronique
9 months ago
That's correct! Asymmetric encryption uses different keys for encryption and decryption.
upvoted 0 times
...
Winifred
9 months ago
A) Asymmetric
upvoted 0 times
...
...
Sanda
10 months ago
I agree with Rebbeca, asymmetric encryption is more secure as it uses separate keys for encryption and decryption.
upvoted 0 times
...
Rebbeca
10 months ago
I think it's A) Asymmetric because it uses different keys for encryption and decryption.
upvoted 0 times
...
Tess
11 months ago
A) Asymmetric encryption
upvoted 0 times
...
Sarah
11 months ago
A) Asymmetric is more secure as it involves a public and private key pair.
upvoted 0 times
...
Bettina
11 months ago
B) Symmetric is not the answer because it uses the same key for both encryption and decryption.
upvoted 0 times
...
Aleisha
11 months ago
A) Asymmetric because it uses different keys for encryption and decryption.
upvoted 0 times
...

Save Cancel