Labour Day Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

212-81 EC-Council Certified Encryption Specialist (ECES) Questions and Answers

Questions 4

With Electronic codebook (ECB) what happens:

Options:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

The block cipher is turned into a stream cipher

D.

The cipher text from the current round is XORed with the plaintext for the next round

Buy Now
Questions 5

Which one of the following attempts to hide data in plain view?

Options:

A.

Cryptography

B.

Substitution

C.

Steganography

D.

Asymmetric cryptography

Buy Now
Questions 6

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Options:

A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access 2 (WPA2)

C.

Wi-Fi Protected Access (WPA)

D.

Temporal Key Integrity Protocol (TKIP)

Buy Now
Questions 7

A _____ is a function that takes a variable-size input m and returns a fixed-size string.

Options:

A.

Feistel

B.

Asymmetric cipher

C.

Symmetric cipher

D.

Hash

Buy Now
Questions 8

Which of the following is required for a hash?

Options:

A.

Not vulnerable to a brute force attack

B.

Few collisions

C.

Must use SALT

D.

Not reversible

E.

Variable length input, fixed length output

F.

Minimum key length

Buy Now
Questions 9

Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.

Options:

A.

VPN

B.

PGP

C.

Cryptool

D.

VeraCrypt

Buy Now
Questions 10

A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.

Options:

A.

Total Break

B.

Distinguishing Algorithm

C.

Instance Deduction

D.

Information Deduction

Buy Now
Questions 11

Which of the following is a substitution cipher used by ancient Hebrew scholars?

Options:

A.

Atbash

B.

Vigenere

C.

Caesar

D.

Scytale

Buy Now
Questions 12

In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.

Options:

A.

Information deduction

B.

Total break

C.

Instance deduction

D.

Global deduction

Buy Now
Questions 13

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

Options:

A.

Key distribution

B.

Security

C.

Scalability

D.

Speed

Buy Now
Questions 14

What best describes the shifting of each letter a fixed number of spaces to the left or right?

Options:

A.

Single substitution

B.

Multi substitution

C.

XOR

D.

Bit shifting

Buy Now
Questions 15

You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as

Options:

A.

Odd numbers with no divisors

B.

Odd numbers

C.

Any number only divisible by odd numbers

D.

Any number only divisible by one and itself

Buy Now
Questions 16

A ______ refers to a situation where two different inputs yield the same output.

Options:

A.

Convergence

B.

Collision

C.

Transposition

D.

Substitution

Buy Now
Questions 17

What is Kerchoff's principle?

Options:

A.

A minimum of 15 rounds is needed for a Feistel cipher to be secure

B.

Only the key needs to be secret, not the actual algorithm

C.

Both algorithm and key should be kept secret

D.

A minimum key size of 256 bits is necessary for security

Buy Now
Questions 18

Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.

Options:

A.

Decoding

B.

Substitution

C.

Transposition

D.

Collision

Buy Now
Questions 19

What is the largest key size that AES can use?

Options:

A.

256

B.

56

C.

512

D.

128

Buy Now
Questions 20

Which of the following is an asymmetric algorithm that was first publically described in 1977?

Options:

A.

Elliptic Curve

B.

Twofish

C.

DESX

D.

RSA

Buy Now
Questions 21

Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?

Options:

A.

160

B.

512

C.

256

D.

128

Buy Now
Questions 22

What type of encryption uses different keys to encrypt and decrypt the message?

Options:

A.

Asymmetric

B.

Symmetric

C.

Secure

D.

Private key

Buy Now
Questions 23

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.

Options:

A.

PKI

B.

GOST

C.

CA

D.

PIKE

Buy Now
Questions 24

With Cipher-block chaining (CBC) what happens?

Options:

A.

The block cipher is turned into a stream cipher

B.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

C.

Each block of plaintext is XORed with the previous ciphertext block before being encrypted

D.

The cipher text from the current round is XORed with the plaintext for the next round

Buy Now
Questions 25

Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?

Options:

A.

Pegasus

B.

Blowfish

C.

SHA1

D.

AES

Buy Now
Questions 26

How does Kerberos generate the first secret key in the authentication process?

Options:

A.

By generating a random AES key

B.

By creating a hash of the user password

C.

By hashing the user ID, network ID. and salt

D.

By using the user's public key

Buy Now
Questions 27

When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.

Options:

A.

Mersenne's number

B.

Fermat's number

C.

Euler's totient

D.

Fermat's prime

Buy Now
Questions 28

What is the solution to the equation 8 mod 3?

Options:

A.

1

B.

4

C.

3

D.

2

Buy Now
Questions 29

Which of the following uses an 80 bit key on 64 bit blocks?

Options:

A.

Skipjack

B.

Twofish

C.

DES

D.

AES

Buy Now
Questions 30

What is a salt?

Options:

A.

Key whitening

B.

Random bits intermixed with a symmetric cipher to increase randomness and make it more secure

C.

Key rotation

D.

Random bits intermixed with a hash to increase randomness and reduce collisions

Buy Now
Questions 31

What is the basis for the difficulty in breaking RSA?

Options:

A.

Hashing

B.

The birthday paradox

C.

Equations that describe an elliptic curve

D.

Factoring numbers

Buy Now
Questions 32

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

Options:

A.

PKI

B.

DES

C.

RSA

D.

Diffie-Helmann

Buy Now
Questions 33

What must occur in order for a cipher to be considered ‘broken’?

Options:

A.

Uncovering the algorithm used

B.

Decoding the key

C.

Finding any method that is more efficient than brute force

D.

Rendering the cipher no longer useable

Buy Now
Questions 34

All of the following are key exchange protocols except for____

Options:

A.

MQV

B.

AES

C.

ECDH

D.

DH

Buy Now
Questions 35

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

Options:

A.

SHA2

B.

MD5

C.

MD4

D.

PIKE

Buy Now
Questions 36

The greatest weakness with symmetric algorithms is _____.

Options:

A.

They are less secure than asymmetric

B.

The problem of key exchange

C.

The problem of generating keys

D.

They are slower than asymmetric

Buy Now
Questions 37

John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)

Options:

A.

Encrypt mode

B.

Transport mode

C.

Tunnel mode

D.

Decrypt mode

Buy Now
Questions 38

The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).

Options:

A.

Odd numbers

B.

Fibonacci Sequence

C.

Fermat pseudoprime

D.

Prime numbers

Buy Now
Questions 39

Which of the following algorithms uses three different keys to encrypt the plain text?

Options:

A.

Skipjack

B.

AES

C.

Blowfish

D.

3DES

Buy Now
Questions 40

DES has a key space of what?

Options:

A.

2^128

B.

2^192

C.

2^64

D.

2^56

Buy Now
Questions 41

The most common way steganography is accomplished is via which one of the following?

Options:

A.

rsb

B.

Isb

C.

msb

D.

asb

Buy Now
Questions 42

Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?

Options:

A.

Block cipher

B.

Asymmetric

C.

Symmetric

D.

Stream cipher

Buy Now
Questions 43

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?

Options:

A.

Avalanche

B.

Confusion

C.

Scrambling

D.

Diffusion

Buy Now
Questions 44

A cipher is defined as what

Options:

A.

The algorithm(s) needed to encrypt and decrypt a message

B.

Encrypted text

C.

The key used to encrypt a message

D.

Any algorithm used in cryptography

Buy Now
Questions 45

Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?

Options:

A.

A substitution box where input bits are replaced

B.

A black box for the algorithm implementation

C.

A shifting box where input bits are shifted

D.

Another name for the round function

Buy Now
Questions 46

You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?

Options:

A.

CA

B.

X.509

C.

CRL

D.

RFC 2298

Buy Now
Questions 47

Which method of password cracking takes the most time and effort?

Options:

A.

Dictionary attack

B.

Shoulder surfing

C.

Brute force

D.

Rainbow tables

Buy Now
Questions 48

Which of the following are valid key sizes for AES (choose three)?

Options:

A.

192

B.

56

C.

256

D.

128

E.

512

F.

64

Buy Now
Questions 49

Which service in a PKI will vouch for the identity of an individual or company?

Options:

A.

CA

B.

CR

C.

KDC

D.

CBC

Buy Now
Questions 50

What does Output feedback (OFB) do:

Options:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

A block cipher is converted into a stream cipher by generating a keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext

D.

The cipher text from the current round is XORed with the plaintext for the next round

Buy Now
Questions 51

Changes to one character in the plain text affect multiple characters in the cipher text, unlike in historical algorithms where each plain text character only affect one cipher text character.

Options:

A.

Substitution

B.

Avalanche

C.

Confusion

D.

Diffusion

Buy Now
Questions 52

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

Options:

A.

Skipjack

B.

Blowfish

C.

MD5

D.

Serpent

Buy Now
Questions 53

How can rainbow tables be defeated?

Options:

A.

Lockout accounts under brute force password cracking attempts

B.

All uppercase character passwords

C.

Use of non-dictionary words

D.

Password salting

Buy Now
Questions 54

This is a proprietary version of PAP. Encrypts username and password as it is sent across network.

Options:

A.

PPTP VPN

B.

S-PAP

C.

Kerberos

D.

WPA2

Buy Now
Questions 55

Which one of the following uses three different keys, all of the same size?

Options:

A.

3DES

B.

AES

C.

RSA

D.

DES

Buy Now
Questions 56

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?

Options:

A.

Vigenere's principle

B.

Shamir's principle

C.

Kerkchoff's principle

D.

Babbage's principle

Buy Now
Questions 57

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

Options:

A.

IPsec Policy Agent

B.

Internet Key Exchange (IKE)

C.

Oakley

D.

IPsec driver

Buy Now
Questions 58

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?

Options:

A.

Me mod n

B.

Ce mod n

C.

y2 = x3 + Ax + B

D.

P = Cd mod n

Buy Now
Questions 59

RFC 1321 describes what hash?

Options:

A.

RIPEMD

B.

GOST

C.

SHA1

D.

MD5

Buy Now
Questions 60

Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?

Options:

A.

Cryptography

B.

Steganalysis

C.

Cryptology

D.

Steganography

Buy Now
Questions 61

Which algorithm implements an unbalanced Feistel cipher?

Options:

A.

Skipjack

B.

RSA

C.

3DES

D.

Blowfish

Buy Now
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Apr 23, 2024
Questions: 206

PDF + Testing Engine

$66.4  $165.99

Testing Engine

$46  $114.99
buy now 212-81 testing engine

PDF (Q&A)

$42  $104.99
buy now 212-81 pdf