Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

212-81 Exam Dumps - EC-Council Certified Encryption Specialist (ECES)

Question # 4

A linear congruential generator is an example of what?

A.

A coprime generator

B.

A prime number generator

C.

A pseudo random number generator

D.

A random number generator

Full Access
Question # 5

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

A.

IPsec Policy Agent

B.

Internet Key Exchange (IKE)

C.

Oakley

D.

IPsec driver

Full Access
Question # 6

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?

A.

Elliptic Curve

B.

NMD5

C.

RSA

D.

Diffie-Hellman

Full Access
Question # 7

Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?

A.

Atbash

B.

Caesar

C.

Scytale

D.

Vigenere

Full Access
Question # 8

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

A.

Keyed Hashing

B.

Double Hashing

C.

Salting

D.

Key Stretching

Full Access
Question # 9

Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.

A.

Scytale Cipher

B.

Playfair Cipher

C.

Homophonic Substitution

D.

ADFVGX Cipher

Full Access
Question # 10

What size key does Skipjack use?

A.

128 bit

B.

56 bit

C.

80 bit

D.

256 bit

Full Access
Question # 11

When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.

A.

Mersenne's number

B.

Fermat's number

C.

Euler's totient

D.

Fermat's prime

Full Access
Question # 12

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

A.

PKI

B.

DES

C.

RSA

D.

Diffie-Helmann

Full Access
Question # 13

_____ uses at least two different shifts, changing the shift with different letters in the plain text.

A.

Caesar cipher

B.

multi-alphabet encryption

C.

Scytale

D.

Atbash

Full Access
Question # 14

Which of the following would be the fastest.

A.

EC

B.

DH

C.

RSA

D.

AES

Full Access
Question # 15

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access 2 (WPA2)

C.

Wi-Fi Protected Access (WPA)

D.

Temporal Key Integrity Protocol (TKIP)

Full Access
Question # 16

What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?

A.

Chosen plaintext

B.

Differential cryptanalysis

C.

Known-plaintext attack

D.

Kasiski examination

Full Access
Question # 17

Which one of the following uses three different keys, all of the same size?

A.

3DES

B.

AES

C.

RSA

D.

DES

Full Access
Question # 18

Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?

A.

Cryptography

B.

Steganalysis

C.

Cryptology

D.

Steganography

Full Access
Question # 19

What size block does Skipjack use?

A.

64

B.

512

C.

128

D.

256

Full Access
Question # 20

Which of the following equations is related to EC?

A.

P = Cd%n

B.

Me%n

C.

y^2 = x^3 + Ax + B

D.

Let m = (p-1)(q-1)

Full Access
Question # 21

Which of the following is the successor of SSL?

A.

GRE

B.

RSA

C.

IPSec

D.

TLS

Full Access
Question # 22

Which of the following acts as a verifier for the certificate authority?

A.

Certificate Management system

B.

Directory management system

C.

Registration authority

D.

Certificate authority

Full Access
Question # 23

Which of the following would be the weakest encryption algorithm?

A.

DES

B.

AES

C.

RSA

D.

EC

Full Access
Question # 24

Message hidden in unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind.

A.

Caesar Cipher

B.

Null Ciphers

C.

Vigenere Cipher

D.

Playfair Cipher

Full Access
Question # 25

____________cryptography uses one key to encrypt a message and a different key to decrypt it.

A.

Secure

B.

Asymmetric

C.

Stream

D.

Symmetric

Full Access
Question # 26

With Cipher-block chaining (CBC) what happens?

A.

The block cipher is turned into a stream cipher

B.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

C.

Each block of plaintext is XORed with the previous ciphertext block before being encrypted

D.

The cipher text from the current round is XORed with the plaintext for the next round

Full Access
Question # 27

All of the following are key exchange protocols except for____

A.

MQV

B.

AES

C.

ECDH

D.

DH

Full Access
Question # 28

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

A.

SHA1

B.

SHA-256

C.

RSA

D.

MD5

Full Access
Question # 29

This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.

A.

RC4

B.

Blowfish

C.

Twofish

D.

FISH

Full Access
Question # 30

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

A.

128 bit and CRC

B.

128 bi and TKIP

C.

128 bit and CCMP

D.

64 bit and CCMP

Full Access
Question # 31

The reverse process from encoding - converting the encoded message back into its plaintext format.

A.

Substitution

B.

Whitening

C.

Encoding

D.

Decoding

Full Access
Question # 32

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

A.

Key distribution

B.

Security

C.

Scalability

D.

Speed

Full Access
Question # 33

John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?

A.

Kerberos

B.

EAP

C.

Radius

D.

CHAP

Full Access
Question # 34

Which of the following is not a key size used by AES?

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 b

Full Access
Question # 35

This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.

A.

SHA-256

B.

FORK-256

C.

SHA-1

D.

RSA

Full Access
Question # 36

Electromechanical rotor-based cipher used in World War II

A.

ROT13 Cipher

B.

Cipher Disk

C.

Enigma Machine

D.

Rail Fence Cipher

Full Access
Question # 37

How can rainbow tables be defeated?

A.

Lockout accounts under brute force password cracking attempts

B.

All uppercase character passwords

C.

Use of non-dictionary words

D.

Password salting

Full Access
Question # 38

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.

A.

PKI

B.

GOST

C.

CA

D.

PIKE

Full Access
Question # 39

In 1977 researchers and MIT described what asymmetric algorithm?

A.

DH

B.

RSA

C.

AES

D.

EC

Full Access
Question # 40

The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).

A.

Odd numbers

B.

Fibonacci Sequence

C.

Fermat pseudoprime

D.

Prime numbers

Full Access
Question # 41

John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)

A.

Encrypt mode

B.

Transport mode

C.

Tunnel mode

D.

Decrypt mode

Full Access
Question # 42

Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186

A.

AES

B.

RC4

C.

DSA

D.

RSA

Full Access
Question # 43

Which one of the following is a component of the PKI?

A.

CA

B.

TGS

C.

OCSP

D.

TGT

Full Access
Question # 44

Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 ≤ Xi ≤ m.

A.

Lehmer Random Number Generator

B.

Lagged Fibonacci Generator

C.

Linear Congruential Generator

D.

Blum Blum Shub

Full Access
Question # 45

A real time protocol for verifying certificates (and a newer method than CRL).

A.

Online Certificate Status Protocol (OCSP)

B.

Server-based Certificate Validation Protocol (SCVP)

C.

Public Key Infrastructure (PKI)

D.

Registration Authority (RA)

Full Access
Question # 46

What is the basis for the difficulty in breaking RSA?

A.

Hashing

B.

The birthday paradox

C.

Equations that describe an elliptic curve

D.

Factoring numbers

Full Access
Question # 47

This is a proprietary version of PAP. Encrypts username and password as it is sent across network.

A.

PPTP VPN

B.

S-PAP

C.

Kerberos

D.

WPA2

Full Access
Question # 48

Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.

A.

Certificate Authority

B.

Raw Quick Pair

C.

Chi-Square Analysis

D.

SP network

Full Access
Question # 49

Storing private keys with a third party is referred to as what?

A.

Key caching

B.

Key storage

C.

Key banking

D.

Key escrow

Full Access
Question # 50

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

A.

SHA-0

B.

SHA-2

C.

SHA-1

D.

SHA-3

Full Access
Question # 51

A non-secret binary vector used as the initializing input algorithm for encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.

A.

IV

B.

Salt

C.

L2TP

D.

Nonce

Full Access
Question # 52

Ahlen is using a set of pre-calculated hashes to attempt to derive the passwords from a Windows SAM file. What is a set of pre-calculated hashes used to derive a hashed password called?

A.

Hash matrix

B.

Rainbow table

C.

Password table

D.

Hash table

Full Access
Question # 53

Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.

A.

VPN

B.

PGP

C.

Cryptool

D.

VeraCrypt

Full Access
Question # 54

If the round function is a cryptographically secure pseudorandom function, then ___________ rounds is sufficient to make the block cipher a pseudorandom permutation.

A.

2

B.

15

C.

16

D.

3

Full Access
Question # 55

Which one of the following is a symmetric key system using 64-bit blocks?

A.

DES

B.

PGP

C.

DSA

D.

RSA

Full Access
Question # 56

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?

A.

Me mod n

B.

Ce mod n

C.

y2 = x3 + Ax + B

D.

P = Cd mod n

Full Access
Question # 57

In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).

A.

Carrier

B.

Signal

C.

Payload

D.

Channel

Full Access
Question # 58

A list of certificates that have been revoked.

A.

CA

B.

CRL

C.

PCBC

D.

OCSP

Full Access
Question # 59

What must occur in order for a cipher to be considered ‘broken’?

A.

Uncovering the algorithm used

B.

Decoding the key

C.

Finding any method that is more efficient than brute force

D.

Rendering the cipher no longer useable

Full Access
Question # 60

Which one of the following best describes a process that splits the block of plaintext into two separate blocks, then applies the round function to one half, and finally swaps the two halves?

A.

Block ciphers

B.

Symmetric cryptography

C.

Feistel cipher

D.

Substitution cipher

Full Access
Question # 61

With Electronic codebook (ECB) what happens:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

The block cipher is turned into a stream cipher

D.

The cipher text from the current round is XORed with the plaintext for the next round

Full Access