Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > ECCouncil > ECES > 212-81

212-81 EC-Council Certified Encryption Specialist (ECES) Question and Answers

Question # 4

Symmetric algorithm. Designed by James Massey and Xuejia Lai. Operates on 64 bit blocks and has a 128 bit key. Consists of 8 identical transformations each round and an output transformation.

A.

IDEA

B.

RSA

C.

CAST

D.

DES

Full Access
Question # 5

Which of the following acts as a verifier for the certificate authority?

A.

Certificate Management system

B.

Directory management system

C.

Registration authority

D.

Certificate authority

Full Access
Question # 6

____________cryptography uses one key to encrypt a message and a different key to decrypt it.

A.

Secure

B.

Asymmetric

C.

Stream

D.

Symmetric

Full Access
Question # 7

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

A.

Keyed Hashing

B.

Double Hashing

C.

Salting

D.

Key Stretching

Full Access
Question # 8

What is the solution to the equation 8 mod 3?

A.

1

B.

4

C.

3

D.

2

Full Access
Question # 9

What is the basis for the FISH algorithm?

A.

The Lagged Fibonacci generator

B.

Prime number theory

C.

Equations that describe an ellipse

D.

The difficulty in factoring numbers

Full Access
Question # 10

Which of the following would be the fastest.

A.

EC

B.

DH

C.

RSA

D.

AES

Full Access
Question # 11

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

A.

IPsec Policy Agent

B.

Internet Key Exchange (IKE)

C.

Oakley

D.

IPsec driver

Full Access
Question # 12

Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 ≤ Xi ≤ m.

A.

Lehmer Random Number Generator

B.

Lagged Fibonacci Generator

C.

Linear Congruential Generator

D.

Blum Blum Shub

Full Access
Question # 13

You are trying to find a modern method for security web traffic for use in your company's ecommerce web site. Which one of the following is used to encrypt web pages and uses bilateral authentication?

A.

AES

B.

SSL

C.

TLS

D.

3DES

Full Access
Question # 14

Which of the following is not a key size used by AES?

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 b

Full Access
Question # 15

What does the OCSP protocol provide?

A.

Revoked certificates

B.

Hashing

C.

VPN connectivity

D.

Encryption

Full Access
Question # 16

What type of encryption uses different keys to encrypt and decrypt the message?

A.

Asymmetric

B.

Symmetric

C.

Secure

D.

Private key

Full Access
Question # 17

Ahlen is using a set of pre-calculated hashes to attempt to derive the passwords from a Windows SAM file. What is a set of pre-calculated hashes used to derive a hashed password called?

A.

Hash matrix

B.

Rainbow table

C.

Password table

D.

Hash table

Full Access
Question # 18

This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.

A.

SHA-256

B.

FORK-256

C.

SHA-1

D.

RSA

Full Access
Question # 19

Which of the following is a protocol for exchanging keys?

A.

DH

B.

EC

C.

AES

D.

RSA

Full Access
Question # 20

Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.

A.

Key Schedule

B.

Key Clustering

C.

Key Space

D.

Key Exchange

Full Access
Question # 21

Which of the following is an asymmetric algorithm that was first publically described in 1977?

A.

Elliptic Curve

B.

Twofish

C.

DESX

D.

RSA

Full Access
Question # 22

Which algorithm implements an unbalanced Feistel cipher?

A.

Skipjack

B.

RSA

C.

3DES

D.

Blowfish

Full Access
Question # 23

The mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.

A.

Cipher-block chaining (CBC)

B.

Electronic codebook (ECB)

C.

Output feedback (OFB)

D.

Cipher feedback (CFB)

Full Access
Question # 24

Message hidden in unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind.

A.

Caesar Cipher

B.

Null Ciphers

C.

Vigenere Cipher

D.

Playfair Cipher

Full Access
Question # 25

What advantage do symmetric algorithms have over asymmetric algorithms

A.

It is easier to implement them in software

B.

They are more secure

C.

They are faster

D It is easier to exchange keys

Full Access
Question # 26

If you use substitution alone, what weakness is present in the resulting cipher text?

A.

It is the same length as the original text

B.

It is easily broken with modern computers

C.

It maintains letter and word frequency

D.

It is too simple

Full Access
Question # 27

This is a proprietary version of PAP. Encrypts username and password as it is sent across network.

A.

PPTP VPN

B.

S-PAP

C.

Kerberos

D.

WPA2

Full Access
Question # 28

Which one of the following best describes a process that splits the block of plaintext into two separate blocks, then applies the round function to one half, and finally swaps the two halves?

A.

Block ciphers

B.

Symmetric cryptography

C.

Feistel cipher

D.

Substitution cipher

Full Access
Question # 29

Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?

A.

Differential Analysis

B.

Discrete Cosine Transform

C.

Raw Quick Pair

D.

Chi squared analysis

Full Access
Question # 30

DES has a key space of what?

A.

2^128

B.

2^192

C.

2^64

D.

2^56

Full Access
Question # 31

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?

A.

Complete diffusion

B.

Complete scrambling

C.

Complete confusion

D.

Complete avalanche

Full Access
Question # 32

What does Output feedback (OFB) do:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

A block cipher is converted into a stream cipher by generating a keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext

D.

The cipher text from the current round is XORed with the plaintext for the next round

Full Access
Question # 33

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

A.

SHA2

B.

MD5

C.

MD4

D.

PIKE

Full Access
Question # 34

Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.

A.

Cipher disk

B.

Caesar cipher

C.

Scytale

D.

Enigma machine

Full Access
Question # 35

A cipher is defined as what

A.

The algorithm(s) needed to encrypt and decrypt a message

B.

Encrypted text

C.

The key used to encrypt a message

D.

Any algorithm used in cryptography

Full Access
Question # 36

Which of the following techniques is used (other than brute force) to attempt to derive a key?

A.

Cryptography

B.

Cryptoanalysis

C.

Password cracking

D.

Hacking

Full Access
Question # 37

A measure of the uncertainty associated with a random variable.

A.

Collision

B.

Whitening

C.

Diffusion

D.

Entropy

Full Access
Question # 38

Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.

A.

Tiger

B.

GOST

C.

RIPEMD

D.

ElGamal

Full Access
Question # 39

Which of the following uses an 80 bit key on 64 bit blocks?

A.

Skipjack

B.

Twofish

C.

DES

D.

AES

Full Access
Question # 40

What is a salt?

A.

Key whitening

B.

Random bits intermixed with a symmetric cipher to increase randomness and make it more secure

C.

Key rotation

D.

Random bits intermixed with a hash to increase randomness and reduce collisions

Full Access
Question # 41

A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.

A.

TIGER

B.

GOST

C.

MD5

D.

MD6

Full Access
Question # 42

In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?

A.

IPSec does not involve gateways

B.

Only transport mode can be used

C.

Encapsulating Security Payload (ESP) authentication must be used

D.

Only the tunnel mode can be used

Full Access
Question # 43

In 1977 researchers and MIT described what asymmetric algorithm?

A.

DH

B.

RSA

C.

AES

D.

EC

Full Access
Question # 44

How does Kerberos generate the first secret key in the authentication process?

A.

By generating a random AES key

B.

By creating a hash of the user password

C.

By hashing the user ID, network ID. and salt

D.

By using the user's public key

Full Access
Question # 45

You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?

A.

CA

B.

X.509

C.

CRL

D.

RFC 2298

Full Access
Question # 46

Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.

A.

Key

B.

IV

C.

Chain

D.

Salt

Full Access
Question # 47

What must occur in order for a cipher to be considered ‘broken’?

A.

Uncovering the algorithm used

B.

Decoding the key

C.

Finding any method that is more efficient than brute force

D.

Rendering the cipher no longer useable

Full Access
Question # 48

Storing private keys with a third party is referred to as what?

A.

Key caching

B.

Key storage

C.

Key banking

D.

Key escrow

Full Access
Question # 49

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

A.

PKI

B.

DES

C.

RSA

D.

Diffie-Helmann

Full Access
Question # 50

Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.

A.

Decoding

B.

Substitution

C.

Transposition

D.

Collision

Full Access
Question # 51

A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.

A.

Registration Authority

B.

Payload

C.

OCSP

D.

Digital Certificate

Full Access
Question # 52

Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?

A.

WEP

B.

WPA

C.

WPA2

D.

TKIP

Full Access
Question # 53

During the process of encryption and decryption, what keys are shared?

A.

Public keys

B.

Public and private keys

C.

User passwords

D.

Private keys

Full Access
Question # 54

A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.

A.

Total Break

B.

Distinguishing Algorithm

C.

Instance Deduction

D.

Information Deduction

Full Access
Question # 55

Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.

A.

CLR

B.

OCSP

C.

TLS

D.

IPSec

Full Access
Question # 56

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ________ integrity check mechanism provides security against a replay attack.

A.

CBC-MAC

B.

CRC-MAC

C.

CRC-32

D.

CBC-32

Full Access
Question # 57

In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed

A.

Vector

B.

Salt

C.

Stream

D.

IV

Full Access
Question # 58

A list of certificates that have been revoked.

A.

CA

B.

CRL

C.

PCBC

D.

OCSP

Full Access
Question # 59

Which of the following is an asymmetric cipher?

A.

RSA

B.

AES

C.

DES

D.

RC4

Full Access
Question # 60

Which of the following is assured by the use of a hash?

A.

Confidentiality

B.

Availability

C.

Authentication

D.

Integrity

Full Access
Question # 61

Which of the following would be the weakest encryption algorithm?

A.

DES

B.

AES

C.

RSA

D.

EC

Full Access