Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ECCouncil 212-81 EC-Council Certified Encryption Specialist (ECES) Exam Practice Test

Demo: 61 questions
Total 206 questions

EC-Council Certified Encryption Specialist (ECES) Questions and Answers

Question 1

Which of the following acts as a verifier for the certificate authority?

Options:

A.

Certificate Management system

B.

Directory management system

C.

Registration authority

D.

Certificate authority

Question 2

A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.

Options:

A.

ADFVGX Cipher

B.

ROT13 Cipher

C.

Book Ciphers

D.

Cipher Disk

Question 3

Which of the following is an asymmetric cipher?

Options:

A.

RSA

B.

AES

C.

DES

D.

RC4

Question 4

Which service in a PKI will vouch for the identity of an individual or company?

Options:

A.

CA

B.

CR

C.

KDC

D.

CBC

Question 5

An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.

Options:

A.

Differential Cryptanalysis

B.

Linear Cryptanalysis

C.

Chosen Plaintext Attack

D.

Integral Cryptanalysis

Question 6

A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed

Options:

A.

Туре 1

B.

Туре 4

C.

Туре 2

D.

Туре 3

Question 7

Which of the following would be the weakest encryption algorithm?

Options:

A.

DES

B.

AES

C.

RSA

D.

EC

Question 8

Which of the following would be the fastest.

Options:

A.

EC

B.

DH

C.

RSA

D.

AES

Question 9

If the round function is a cryptographically secure pseudorandom function, then ___________ rounds is sufficient to make the block cipher a pseudorandom permutation.

Options:

A.

2

B.

15

C.

16

D.

3

Question 10

Which of the following is used to encrypt email and create digital signatures?

Options:

A.

DES

B.

SHA1

C.

AES

D.

RSA

Question 11

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

Options:

A.

Skipjack

B.

Blowfish

C.

MD5

D.

Serpent

Question 12

If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.

Options:

A.

15

B.

16

C.

3

D.

4

Question 13

Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.

Options:

A.

Key Schedule

B.

Key Clustering

C.

Key Space

D.

Key Exchange

Question 14

Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186

Options:

A.

AES

B.

RC4

C.

DSA

D.

RSA

Question 15

A number that is used only one time, then discarded is called what?

Options:

A.

IV

B.

Nonce

C.

Chain

D.

Salt

Question 16

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

Options:

A.

SHA-0

B.

SHA-2

C.

SHA-1

D.

SHA-3

Question 17

With Electronic codebook (ECB) what happens:

Options:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

The block cipher is turned into a stream cipher

D.

The cipher text from the current round is XORed with the plaintext for the next round

Question 18

Which one of the following is a symmetric key system using 64-bit blocks?

Options:

A.

DES

B.

PGP

C.

DSA

D.

RSA

Question 19

What does the OCSP protocol provide?

Options:

A.

Revoked certificates

B.

Hashing

C.

VPN connectivity

D.

Encryption

Question 20

The time and effort required to break a security measure.

Options:

A.

Session Key

B.

Work factor

C.

Non-repudiation

D.

Payload

Question 21

Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?

Options:

A.

A substitution box where input bits are replaced

B.

A black box for the algorithm implementation

C.

A shifting box where input bits are shifted

D.

Another name for the round function

Question 22

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?

Options:

A.

Me mod n

B.

Ce mod n

C.

y2 = x3 + Ax + B

D.

P = Cd mod n

Question 23

Which one of the following terms describes two numbers that have no common factors?

Options:

A.

Coprime

B.

Fermat's number

C.

Euler's totient

D.

Convergent

Question 24

Which of the following is an asymmetric algorithm that was first publically described in 1977?

Options:

A.

Elliptic Curve

B.

Twofish

C.

DESX

D.

RSA

Question 25

____________cryptography uses one key to encrypt a message and a different key to decrypt it.

Options:

A.

Secure

B.

Asymmetric

C.

Stream

D.

Symmetric

Question 26

Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.

Options:

A.

Linear cryptanalysis

B.

Replay attack

C.

Side-channel attack

D.

Social engineering attack

Question 27

In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?

Options:

A.

IPSec does not involve gateways

B.

Only transport mode can be used

C.

Encapsulating Security Payload (ESP) authentication must be used

D.

Only the tunnel mode can be used

Question 28

What type of encryption uses different keys to encrypt and decrypt the message?

Options:

A.

Asymmetric

B.

Symmetric

C.

Secure

D.

Private key

Question 29

If you wished to see a list of revoked certificates from a CA, where would you look?

Options:

A.

RA

B.

RFC

C.

CRL

D.

CA

Question 30

3DES can best be classified as which one of the following?

Options:

A.

Digital signature

B.

Symmetric algorithm

C.

Asymmetric algorithm

D.

Hashing algorithm

Question 31

_____ uses at least two different shifts, changing the shift with different letters in the plain text.

Options:

A.

Caesar cipher

B.

multi-alphabet encryption

C.

Scytale

D.

Atbash

Question 32

Which of the following equations is related to EC?

Options:

A.

P = Cd%n

B.

Me%n

C.

y^2 = x^3 + Ax + B

D.

Let m = (p-1)(q-1)

Question 33

During the process of encryption and decryption, what keys are shared?

Options:

A.

Public keys

B.

Public and private keys

C.

User passwords

D.

Private keys

Question 34

Which of the following is a protocol for exchanging keys?

Options:

A.

DH

B.

EC

C.

AES

D.

RSA

Question 35

Which of the following is not a key size used by AES?

Options:

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 b

Question 36

A linear congruential generator is an example of what?

Options:

A.

A coprime generator

B.

A prime number generator

C.

A pseudo random number generator

D.

A random number generator

Question 37

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Options:

A.

WEP

B.

WEP2

C.

WPA

D.

WPA2

Question 38

The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).

Options:

A.

Odd numbers

B.

Fibonacci Sequence

C.

Fermat pseudoprime

D.

Prime numbers

Question 39

Which of the following is the successor of SSL?

Options:

A.

GRE

B.

RSA

C.

IPSec

D.

TLS

Question 40

Developed by Netscape and has been replaced by TLS. It was the preferred method used with secure websites.

Options:

A.

OCSP

B.

VPN

C.

CRL

D.

SSL

Question 41

A _____ is a function that takes a variable-size input m and returns a fixed-size string.

Options:

A.

Feistel

B.

Asymmetric cipher

C.

Symmetric cipher

D.

Hash

Question 42

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?

Options:

A.

Complete diffusion

B.

Complete scrambling

C.

Complete confusion

D.

Complete avalanche

Question 43

Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?

Options:

A.

RSA

B.

AES

C.

RC4

D.

SHA-1

Question 44

In 1977 researchers and MIT described what asymmetric algorithm?

Options:

A.

DH

B.

RSA

C.

AES

D.

EC

Question 45

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

Options:

A.

PKI

B.

DES

C.

RSA

D.

Diffie-Helmann

Question 46

Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Options:

A.

WEP2

B.

WPA

C.

WEP

D.

WPA2

Question 47

RFC 1321 describes what hash?

Options:

A.

RIPEMD

B.

GOST

C.

SHA1

D.

MD5

Question 48

Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.

Options:

A.

VPN

B.

PGP

C.

Cryptool

D.

VeraCrypt

Question 49

A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.

Options:

A.

Blum Blum Shub

B.

Elliptic Curve

C.

Menezes-Qu-Vanstone

D.

Euler's totient

Question 50

What does Output feedback (OFB) do:

Options:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

A block cipher is converted into a stream cipher by generating a keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext

D.

The cipher text from the current round is XORed with the plaintext for the next round

Question 51

Which of the following is the standard for digital certificates?

Options:

A.

RFC 2298

B.

X.509

C.

CRL

D.

CA

Question 52

A part of understanding symmetric cryptography understands the modes in which it can be used. You are

explaining those modes to a group of cryptography students. The most basic encryption mode is____________.

The message is divided into blocks, and each block is encrypted separately with no modification to the process.

Options:

A.

Cipher block chaining (CBC)

B.

Cipher feedback (CFB)

C.

Output feedback (OFB)

D.

Electronic codebook (ECB)

Question 53

Which one of the following is a component of the PKI?

Options:

A.

CA

B.

TGS

C.

OCSP

D.

TGT

Question 54

Electromechanical rotor-based cipher used in World War II

Options:

A.

ROT13 Cipher

B.

Cipher Disk

C.

Enigma Machine

D.

Rail Fence Cipher

Question 55

Cryptographic hashes are often used for message integrity and password storage. It is important to understand the common properties of all cryptographic hashes. What is not true about a hash?

Options:

A.

Few collisions

B.

Reversible

C.

Variable length input

D.

Fixed length output

Question 56

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

Options:

A.

SHA2

B.

MD5

C.

MD4

D.

PIKE

Question 57

The ATBASH cipher is best described as what type of cipher?

Options:

A.

Asymmetric

B.

Symmetric

C.

Substitution

D.

Transposition

Question 58

Which of the following techniques is used (other than brute force) to attempt to derive a key?

Options:

A.

Cryptography

B.

Cryptoanalysis

C.

Password cracking

D.

Hacking

Question 59

What size block does Skipjack use?

Options:

A.

64

B.

512

C.

128

D.

256

Question 60

Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm.

Options:

A.

Blowfish

B.

Rijndael

C.

Lucifer

D.

El Gamal

Question 61

Which one of the following uses three different keys, all of the same size?

Options:

A.

3DES

B.

AES

C.

RSA

D.

DES

Demo: 61 questions
Total 206 questions