Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

212-81 Exam Dumps - EC-Council Certified Encryption Specialist (ECES)

Go to page:
Question # 25

____________cryptography uses one key to encrypt a message and a different key to decrypt it.

A.

Secure

B.

Asymmetric

C.

Stream

D.

Symmetric

Full Access
Question # 26

With Cipher-block chaining (CBC) what happens?

A.

The block cipher is turned into a stream cipher

B.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

C.

Each block of plaintext is XORed with the previous ciphertext block before being encrypted

D.

The cipher text from the current round is XORed with the plaintext for the next round

Full Access
Question # 27

All of the following are key exchange protocols except for____

A.

MQV

B.

AES

C.

ECDH

D.

DH

Full Access
Question # 28

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

A.

SHA1

B.

SHA-256

C.

RSA

D.

MD5

Full Access
Question # 29

This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.

A.

RC4

B.

Blowfish

C.

Twofish

D.

FISH

Full Access
Question # 30

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

A.

128 bit and CRC

B.

128 bi and TKIP

C.

128 bit and CCMP

D.

64 bit and CCMP

Full Access
Question # 31

The reverse process from encoding - converting the encoded message back into its plaintext format.

A.

Substitution

B.

Whitening

C.

Encoding

D.

Decoding

Full Access
Question # 32

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

A.

Key distribution

B.

Security

C.

Scalability

D.

Speed

Full Access
Go to page: