Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

212-81 EC-Council Certified Encryption Specialist (ECES) Questions and Answers

Questions 4

A part of understanding symmetric cryptography understands the modes in which it can be used. You are

explaining those modes to a group of cryptography students. The most basic encryption mode is____________.

The message is divided into blocks, and each block is encrypted separately with no modification to the process.

Options:

A.

Cipher block chaining (CBC)

B.

Cipher feedback (CFB)

C.

Output feedback (OFB)

D.

Electronic codebook (ECB)

Buy Now
Questions 5

What must occur in order for a cipher to be considered ‘broken’?

Options:

A.

Uncovering the algorithm used

B.

Decoding the key

C.

Finding any method that is more efficient than brute force

D.

Rendering the cipher no longer useable

Buy Now
Questions 6

Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?

Options:

A.

WEP

B.

WPA

C.

WPA2

D.

TKIP

Buy Now
Questions 7

What does the OCSP protocol provide?

Options:

A.

Revoked certificates

B.

Hashing

C.

VPN connectivity

D.

Encryption

Buy Now
Questions 8

What is the basis for the difficulty in breaking RSA?

Options:

A.

Hashing

B.

The birthday paradox

C.

Equations that describe an elliptic curve

D.

Factoring numbers

Buy Now
Questions 9

How did the ATBASH cipher work?

Options:

A.

By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.)

B.

By rotating text a given number of spaces

C.

By Multi alphabet substitution

D.

By shifting each letter a certain number of spaces

Buy Now
Questions 10

A _____ is a function is not reversible.

Options:

A.

Stream cipher

B.

Asymmetric cipher

C.

Hash

D.

Block Cipher

Buy Now
Questions 11

_____ uses at least two different shifts, changing the shift with different letters in the plain text.

Options:

A.

Caesar cipher

B.

multi-alphabet encryption

C.

Scytale

D.

Atbash

Buy Now
Questions 12

Storing private keys with a third party is referred to as what?

Options:

A.

Key caching

B.

Key storage

C.

Key banking

D.

Key escrow

Buy Now
Questions 13

A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.

Options:

A.

Total Break

B.

Distinguishing Algorithm

C.

Instance Deduction

D.

Information Deduction

Buy Now
Questions 14

Which of the following is a protocol for exchanging keys?

Options:

A.

DH

B.

EC

C.

AES

D.

RSA

Buy Now
Questions 15

What is a salt?

Options:

A.

Key whitening

B.

Random bits intermixed with a symmetric cipher to increase randomness and make it more secure

C.

Key rotation

D.

Random bits intermixed with a hash to increase randomness and reduce collisions

Buy Now
Questions 16

A list of certificates that have been revoked.

Options:

A.

CA

B.

CRL

C.

PCBC

D.

OCSP

Buy Now
Questions 17

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?

Options:

A.

Vigenere's principle

B.

Shamir's principle

C.

Kerkchoff's principle

D.

Babbage's principle

Buy Now
Questions 18

The reverse process from encoding - converting the encoded message back into its plaintext format.

Options:

A.

Substitution

B.

Whitening

C.

Encoding

D.

Decoding

Buy Now
Questions 19

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?

Options:

A.

Elliptic Curve

B.

NMD5

C.

RSA

D.

Diffie-Hellman

Buy Now
Questions 20

A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.

Options:

A.

Blum Blum Shub

B.

Elliptic Curve

C.

Menezes-Qu-Vanstone

D.

Euler's totient

Buy Now
Questions 21

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

Options:

A.

SHA2

B.

MD5

C.

MD4

D.

PIKE

Buy Now
Questions 22

Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W. Kravitz, and adopted by the U. S. government in 1993 with FIPS 186?

Options:

A.

DSA

B.

AES

C.

RC4

D.

RSA

Buy Now
Questions 23

A disk you rotated to encrypt/decrypt. Created by Leon Alberti. Similar technologies were used in the Enigma machine. Considered the forefather of modern encryption.

Options:

A.

Chi Square

B.

Enigma Machine

C.

Cipher Disks

D.

Scytale Cipher

Buy Now
Questions 24

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.

Options:

A.

Rail Fence Cipher

B.

Null Cipher

C.

Vigenere Cipher

D.

ROT-13

Buy Now
Questions 25

Which of the following algorithms uses three different keys to encrypt the plain text?

Options:

A.

Skipjack

B.

AES

C.

Blowfish

D.

3DES

Buy Now
Questions 26

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

Options:

A.

Key Schedule

B.

Feistel Network

C.

SHA-2

D.

Diffie-Helman

Buy Now
Questions 27

Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?

Options:

A.

Block cipher

B.

Asymmetric

C.

Symmetric

D.

Stream cipher

Buy Now
Questions 28

Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?

Options:

A.

Pegasus

B.

Blowfish

C.

SHA1

D.

AES

Buy Now
Questions 29

Which of the following equations is related to EC?

Options:

A.

P = Cd%n

B.

Me%n

C.

y^2 = x^3 + Ax + B

D.

Let m = (p-1)(q-1)

Buy Now
Questions 30

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

Options:

A.

SHA-0

B.

SHA-2

C.

SHA-1

D.

SHA-3

Buy Now
Questions 31

What type of encryption uses different keys to encrypt and decrypt the message?

Options:

A.

Asymmetric

B.

Symmetric

C.

Secure

D.

Private key

Buy Now
Questions 32

What is a "Collision attack" in cryptography?

Options:

A.

Collision attacks try to break the hash into three parts to get the plaintext value

B.

Collision attacks try to get the public key

C.

Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key

D.

Collision attacks try to find two inputs producing the same

Buy Now
Questions 33

Which one of the following are characteristics of a hash function? (Choose two)

Options:

A.

Requires a key

B.

One-way

C.

Fixed length output

D.

Symmetric

E.

Fast

Buy Now
Questions 34

An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.

Options:

A.

Differential Cryptanalysis

B.

Linear Cryptanalysis

C.

Chosen Plaintext Attack

D.

Integral Cryptanalysis

Buy Now
Questions 35

Why is quantum computing a threat to RSA?

Options:

A.

The processing speed will brute force algorithms

B.

Quantum computers can solve the discrete logarithm problem

C.

Quantum computers can solve the birthday paradox

D.

Quantum computers can factor large integers in polynomial time

Buy Now
Questions 36

With Cipher-block chaining (CBC) what happens?

Options:

A.

The block cipher is turned into a stream cipher

B.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

C.

Each block of plaintext is XORed with the previous ciphertext block before being encrypted

D.

The cipher text from the current round is XORed with the plaintext for the next round

Buy Now
Questions 37

DES has a key space of what?

Options:

A.

2^128

B.

2^192

C.

2^64

D.

2^56

Buy Now
Questions 38

What size key does Skipjack use?

Options:

A.

128 bit

B.

56 bit

C.

80 bit

D.

256 bit

Buy Now
Questions 39

A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used to try to discover patterns and use that information to decrypt the cipher.

Options:

A.

Kasiski Method

B.

Birthday Attack

C.

Information Deduction

D.

Integral Cryptanalysis

Buy Now
Questions 40

Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.

Options:

A.

Cipher disk

B.

Caesar cipher

C.

Scytale

D.

Enigma machine

Buy Now
Questions 41

Which method of password cracking takes the most time and effort?

Options:

A.

Dictionary attack

B.

Shoulder surfing

C.

Brute force

D.

Rainbow tables

Buy Now
Questions 42

What is a TGS?

Options:

A.

The server that escrows keys

B.

A protocol for encryption

C.

A protocol for key exchange

D.

The server that grants Kerberos tickets

Buy Now
Questions 43

How does Kerberos generate the first secret key in the authentication process?

Options:

A.

By generating a random AES key

B.

By creating a hash of the user password

C.

By hashing the user ID, network ID. and salt

D.

By using the user's public key

Buy Now
Questions 44

What is the formula m^e %n related to?

Options:

A.

Encrypting with EC

B.

Decrypting with RSA

C.

Generating Mersenne primes

D.

Encrypting with RSA

Buy Now
Questions 45

A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?

Options:

A.

SHA1

B.

MD5

C.

FORK

D.

RIPEMD

Buy Now
Questions 46

A linear congruential generator is an example of what?

Options:

A.

A coprime generator

B.

A prime number generator

C.

A pseudo random number generator

D.

A random number generator

Buy Now
Questions 47

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Options:

A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access 2 (WPA2)

C.

Wi-Fi Protected Access (WPA)

D.

Temporal Key Integrity Protocol (TKIP)

Buy Now
Questions 48

The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).

Options:

A.

Odd numbers

B.

Fibonacci Sequence

C.

Fermat pseudoprime

D.

Prime numbers

Buy Now
Questions 49

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?

Options:

A.

Complete diffusion

B.

Complete scrambling

C.

Complete confusion

D.

Complete avalanche

Buy Now
Questions 50

Which of the following would be the fastest.

Options:

A.

EC

B.

DH

C.

RSA

D.

AES

Buy Now
Questions 51

Which of the following is a substitution cipher used by ancient Hebrew scholars?

Options:

A.

Atbash

B.

Vigenere

C.

Caesar

D.

Scytale

Buy Now
Questions 52

This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.

Options:

A.

SHA-256

B.

FORK-256

C.

SHA-1

D.

RSA

Buy Now
Questions 53

Numbers that have no factors in common with another.

Options:

A.

Fibonacci Numbers

B.

Even Numbers

C.

Co-prime numbers

D.

Mersenne Primes

Buy Now
Questions 54

A cipher is defined as what

Options:

A.

The algorithm(s) needed to encrypt and decrypt a message

B.

Encrypted text

C.

The key used to encrypt a message

D.

Any algorithm used in cryptography

Buy Now
Questions 55

The most widely used asymmetric encryption algorithm is what?

Options:

A.

Vigenere

B.

Caesar Cipher

C.

RSA

D.

DES

Buy Now
Questions 56

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

Options:

A.

Keyed Hashing

B.

Double Hashing

C.

Salting

D.

Key Stretching

Buy Now
Questions 57

Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186

Options:

A.

AES

B.

RC4

C.

DSA

D.

RSA

Buy Now
Questions 58

Electromechanical rotor-based cipher used in World War II

Options:

A.

ROT13 Cipher

B.

Cipher Disk

C.

Enigma Machine

D.

Rail Fence Cipher

Buy Now
Questions 59

The mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.

Options:

A.

Cipher-block chaining (CBC)

B.

Electronic codebook (ECB)

C.

Output feedback (OFB)

D.

Cipher feedback (CFB)

Buy Now
Questions 60

In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed

Options:

A.

Vector

B.

Salt

C.

Stream

D.

IV

Buy Now
Questions 61

Which one of the following is a symmetric key system using 64-bit blocks?

Options:

A.

DES

B.

PGP

C.

DSA

D.

RSA

Buy Now

ECES |

Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Nov 24, 2024
Questions: 206
212-81 pdf

212-81 PDF

$25.5  $84.99
212-81 Engine

212-81 Testing Engine

$30  $99.99
212-81 PDF + Engine

212-81 PDF + Testing Engine

$40.5  $134.99