Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

ECCouncil 212-81 Dumps

Page: 1 / 21
Total 206 questions

EC-Council Certified Encryption Specialist (ECES) Questions and Answers

Question 1

A ______ refers to a situation where two different inputs yield the same output.

Options:

A.

Convergence

B.

Collision

C.

Transposition

D.

Substitution

Question 2

Ahlen is using a set of pre-calculated hashes to attempt to derive the passwords from a Windows SAM file. What is a set of pre-calculated hashes used to derive a hashed password called?

Options:

A.

Hash matrix

B.

Rainbow table

C.

Password table

D.

Hash table

Question 3

The most common way steganography is accomplished is via which one of the following?

Options:

A.

rsb

B.

Isb

C.

msb

D.

asb

Question 4

A technique used to increase the security of block ciphers. It consists of steps that combine the data with portions of the key (most commonly using a simple XOR) before the first round and after the last round of encryption.

Options:

A.

Whitening

B.

Key Exchange

C.

Key Schedule

D.

Key Clustering

Question 5

Which one of the following is a component of the PKI?

Options:

A.

CA

B.

TGS

C.

OCSP

D.

TGT

Question 6

Which one of the following terms describes two numbers that have no common factors?

Options:

A.

Coprime

B.

Fermat's number

C.

Euler's totient

D.

Convergent

Question 7

Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?

Options:

A.

160

B.

512

C.

256

D.

128

Question 8

The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.

Options:

A.

Steganography

B.

Cryptosystem

C.

Avalanche effect

D.

Key Schedule

Question 9

Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?

Options:

A.

WEP

B.

WPA

C.

WPA2

D.

TKIP

Question 10

A symmetric Stream Cipher published by the German engineering firm Seimans in 1993. A software based stream cipher that uses a Lagged Fibonacci generator along with concepts borrowed from shrinking generator ciphers.

Options:

A.

DESX

B.

FISH

C.

Twofish

D.

IDEA

Question 11

Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186

Options:

A.

AES

B.

RC4

C.

DSA

D.

RSA

Question 12

Which of the following is not a key size used by AES?

Options:

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 b

Question 13

Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?

Options:

A.

A substitution box where input bits are replaced

B.

A black box for the algorithm implementation

C.

A shifting box where input bits are shifted

D.

Another name for the round function

Question 14

Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.

Options:

A.

Tiger

B.

GOST

C.

RIPEMD

D.

ElGamal

Question 15

____________cryptography uses one key to encrypt a message and a different key to decrypt it.

Options:

A.

Secure

B.

Asymmetric

C.

Stream

D.

Symmetric

Question 16

Which service in a PKI will vouch for the identity of an individual or company?

Options:

A.

CA

B.

CR

C.

KDC

D.

CBC

Question 17

The mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.

Options:

A.

Cipher-block chaining (CBC)

B.

Electronic codebook (ECB)

C.

Output feedback (OFB)

D.

Cipher feedback (CFB)

Question 18

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

Options:

A.

Key Schedule

B.

Feistel Network

C.

SHA-2

D.

Diffie-Helman

Question 19

Uses a formula, M_n = 2^n − 1 where n is a prime number, to generate primes. Works for 2, 3, 5, 7 but fails on 11 and on many other n values.

Options:

A.

Fibonacci Numbers

B.

Co-prime Numbers

C.

Even Numbers

D.

Mersenne Primes

Question 20

What is the solution to the equation 8 mod 3?

Options:

A.

1

B.

4

C.

3

D.

2

Question 21

Which of the following is required for a hash?

Options:

A.

Not vulnerable to a brute force attack

B.

Few collisions

C.

Must use SALT

D.

Not reversible

E.

Variable length input, fixed length output

F.

Minimum key length

Question 22

Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.

Options:

A.

Keccak

B.

MD5

C.

SHA-1

D.

TIGER

Question 23

Which one of the following are characteristics of a hash function? (Choose two)

Options:

A.

Requires a key

B.

One-way

C.

Fixed length output

D.

Symmetric

E.

Fast

Question 24

Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.

Options:

A.

Certificate Authority

B.

Raw Quick Pair

C.

Chi-Square Analysis

D.

SP network

Question 25

Which of the following is a protocol for exchanging keys?

Options:

A.

DH

B.

EC

C.

AES

D.

RSA

Question 26

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Options:

A.

WEP

B.

WEP2

C.

WPA

D.

WPA2

Question 27

What is a "Collision attack" in cryptography?

Options:

A.

Collision attacks try to break the hash into three parts to get the plaintext value

B.

Collision attacks try to get the public key

C.

Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key

D.

Collision attacks try to find two inputs producing the same

Question 28

A disk you rotated to encrypt/decrypt. Created by Leon Alberti. Similar technologies were used in the Enigma machine. Considered the forefather of modern encryption.

Options:

A.

Chi Square

B.

Enigma Machine

C.

Cipher Disks

D.

Scytale Cipher

Question 29

You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?

Options:

A.

CA

B.

X.509

C.

CRL

D.

RFC 2298

Question 30

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?

Options:

A.

Elliptic Curve

B.

NMD5

C.

RSA

D.

Diffie-Hellman

Question 31

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?

Options:

A.

Me mod n

B.

Ce mod n

C.

y2 = x3 + Ax + B

D.

P = Cd mod n

Question 32

This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.

Options:

A.

SHA-256

B.

FORK-256

C.

SHA-1

D.

RSA

Question 33

If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?

Options:

A.

Alice's private key

B.

Bob's private key

C.

Alice's public key

D.

Bob's public key

Question 34

Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?

Options:

A.

Atbash

B.

Caesar

C.

Scytale

D.

Vigenere

Question 35

What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?

Options:

A.

Chosen plaintext

B.

Differential cryptanalysis

C.

Known-plaintext attack

D.

Kasiski examination

Question 36

Which one of the following uses three different keys, all of the same size?

Options:

A.

3DES

B.

AES

C.

RSA

D.

DES

Question 37

Which of the following is used to encrypt email and create digital signatures?

Options:

A.

DES

B.

SHA1

C.

AES

D.

RSA

Question 38

DES has a key space of what?

Options:

A.

2^128

B.

2^192

C.

2^64

D.

2^56

Question 39

A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.

Options:

A.

Blum Blum Shub

B.

Elliptic Curve

C.

Menezes-Qu-Vanstone

D.

Euler's totient

Question 40

RFC 1321 describes what hash?

Options:

A.

RIPEMD

B.

GOST

C.

SHA1

D.

MD5

Question 41

When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.

Options:

A.

Mersenne's number

B.

Fermat's number

C.

Euler's totient

D.

Fermat's prime

Question 42

What is a variation of DES that uses a technique called Key Whitening?

Options:

A.

Blowfish

B.

DESX

C.

3DES

D.

AES

Question 43

Which of the following is an asymmetric algorithm related to the equation y^2 = x^3 + Ax + B?

Options:

A.

Blowfish

B.

Elliptic Curve

C.

AES

D.

RSA

Question 44

Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?

Options:

A.

Cryptography

B.

Steganalysis

C.

Cryptology

D.

Steganography

Question 45

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

Options:

A.

SHA2

B.

MD5

C.

MD4

D.

PIKE

Question 46

Which of the following is an asymmetric cipher?

Options:

A.

RSA

B.

AES

C.

DES

D.

RC4

Question 47

Which algorithm implements an unbalanced Feistel cipher?

Options:

A.

Skipjack

B.

RSA

C.

3DES

D.

Blowfish

Question 48

Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?

Options:

A.

K4

B.

K5

C.

K3

D.

K2

E.

K1

Question 49

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

Options:

A.

SHA1

B.

SHA-256

C.

RSA

D.

MD5

Question 50

The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.

Options:

A.

ElGamal

B.

RSA

C.

PAP

D.

X.509

Question 51

Which of the following is generally true about key sizes?

Options:

A.

Larger key sizes increase security

B.

Key size is irrelevant to security

C.

Key sizes must be more than 256 bits to be secure

D.

Smaller key sizes increase security

Question 52

Which of the following is assured by the use of a hash?

Options:

A.

Confidentiality

B.

Availability

C.

Authentication

D.

Integrity

Question 53

A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.

Options:

A.

Total Break

B.

Distinguishing Algorithm

C.

Instance Deduction

D.

Information Deduction

Question 54

A cipher is defined as what

Options:

A.

The algorithm(s) needed to encrypt and decrypt a message

B.

Encrypted text

C.

The key used to encrypt a message

D.

Any algorithm used in cryptography

Question 55

Which one of the following is an example of a symmetric key algorithm?

Options:

A.

ECC

B.

Diffie-Hellman

C.

RSA

D.

Rijndael

Question 56

_____ uses at least two different shifts, changing the shift with different letters in the plain text.

Options:

A.

Caesar cipher

B.

multi-alphabet encryption

C.

Scytale

D.

Atbash

Question 57

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

Options:

A.

PKI

B.

DES

C.

RSA

D.

Diffie-Helmann

Question 58

Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?

Options:

A.

PIKE

B.

Twofish

C.

RC4

D.

Blowfish

Question 59

What does the OCSP protocol provide?

Options:

A.

Revoked certificates

B.

Hashing

C.

VPN connectivity

D.

Encryption

Question 60

Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.

Options:

A.

Key

B.

IV

C.

Chain

D.

Salt

Question 61

A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.

Options:

A.

Registration Authority

B.

Payload

C.

OCSP

D.

Digital Certificate

Page: 1 / 21
Total 206 questions