Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 591klB651

212-81 EC-Council Certified Encryption Specialist (ECES) Questions and Answers

Questions 4

In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed

Options:

A.

Vector

B.

Salt

C.

Stream

D.

IV

Buy Now
Questions 5

John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)

Options:

A.

Encrypt mode

B.

Transport mode

C.

Tunnel mode

D.

Decrypt mode

Buy Now
Questions 6

Which of the following algorithms uses three different keys to encrypt the plain text?

Options:

A.

Skipjack

B.

AES

C.

Blowfish

D.

3DES

Buy Now
Questions 7

This is a proprietary version of PAP. Encrypts username and password as it is sent across network.

Options:

A.

PPTP VPN

B.

S-PAP

C.

Kerberos

D.

WPA2

Buy Now
Questions 8

A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.

Options:

A.

Registration Authority

B.

Payload

C.

OCSP

D.

Digital Certificate

Buy Now
Questions 9

An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.

Options:

A.

CHAP

B.

SPAP

C.

PAP

D.

EAP

Buy Now
Questions 10

Which of the following acts as a verifier for the certificate authority?

Options:

A.

Certificate Management system

B.

Directory management system

C.

Registration authority

D.

Certificate authority

Buy Now
Questions 11

In 1977 researchers and MIT described what asymmetric algorithm?

Options:

A.

DH

B.

RSA

C.

AES

D.

EC

Buy Now
Questions 12

A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.

Options:

A.

ADFVGX Cipher

B.

ROT13 Cipher

C.

Book Ciphers

D.

Cipher Disk

Buy Now
Questions 13

____________cryptography uses one key to encrypt a message and a different key to decrypt it.

Options:

A.

Secure

B.

Asymmetric

C.

Stream

D.

Symmetric

Buy Now
Questions 14

What best describes the shifting of each letter a fixed number of spaces to the left or right?

Options:

A.

Single substitution

B.

Multi substitution

C.

XOR

D.

Bit shifting

Buy Now
Questions 15

Message hidden in unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind.

Options:

A.

Caesar Cipher

B.

Null Ciphers

C.

Vigenere Cipher

D.

Playfair Cipher

Buy Now
Questions 16

Which of the following is an asymmetric algorithm related to the equation y^2 = x^3 + Ax + B?

Options:

A.

Blowfish

B.

Elliptic Curve

C.

AES

D.

RSA

Buy Now
Questions 17

If you wished to see a list of revoked certificates from a CA, where would you look?

Options:

A.

RA

B.

RFC

C.

CRL

D.

CA

Buy Now
Questions 18

Which of the following is a protocol for exchanging keys?

Options:

A.

DH

B.

EC

C.

AES

D.

RSA

Buy Now
Questions 19

You are studying classic ciphers. You have been examining the difference between single substitution and multi-substitution. Which one of the following is an example of a multi-alphabet cipher?

Options:

A.

Rot13

B.

Caesar

C.

Atbash

D.

Vigenère

Buy Now
Questions 20

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?

Options:

A.

Vigenere's principle

B.

Shamir's principle

C.

Kerkchoff's principle

D.

Babbage's principle

Buy Now
Questions 21

With Electronic codebook (ECB) what happens:

Options:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

The block cipher is turned into a stream cipher

D.

The cipher text from the current round is XORed with the plaintext for the next round

Buy Now
Questions 22

3DES can best be classified as which one of the following?

Options:

A.

Digital signature

B.

Symmetric algorithm

C.

Asymmetric algorithm

D.

Hashing algorithm

Buy Now
Questions 23

Which of the following encryption algorithms relies on the inability to factor large prime numbers?

Options:

A.

RSA

B.

MQV

C.

EC

D.

AES

Buy Now
Questions 24

Which of the following is a substitution cipher used by ancient Hebrew scholars?

Options:

A.

Atbash

B.

Vigenere

C.

Caesar

D.

Scytale

Buy Now
Questions 25

Symmetric algorithm. Designed by James Massey and Xuejia Lai. Operates on 64 bit blocks and has a 128 bit key. Consists of 8 identical transformations each round and an output transformation.

Options:

A.

IDEA

B.

RSA

C.

CAST

D.

DES

Buy Now
Questions 26

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

Options:

A.

Key Schedule

B.

Feistel Network

C.

SHA-2

D.

Diffie-Helman

Buy Now
Questions 27

A list of certificates that have been revoked.

Options:

A.

CA

B.

CRL

C.

PCBC

D.

OCSP

Buy Now
Questions 28

Which algorithm implements an unbalanced Feistel cipher?

Options:

A.

Skipjack

B.

RSA

C.

3DES

D.

Blowfish

Buy Now
Questions 29

How did the ATBASH cipher work?

Options:

A.

By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.)

B.

By rotating text a given number of spaces

C.

By Multi alphabet substitution

D.

By shifting each letter a certain number of spaces

Buy Now
Questions 30

Which one of the following is a symmetric key system using 64-bit blocks?

Options:

A.

DES

B.

PGP

C.

DSA

D.

RSA

Buy Now
Questions 31

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ________ integrity check mechanism provides security against a replay attack.

Options:

A.

CBC-MAC

B.

CRC-MAC

C.

CRC-32

D.

CBC-32

Buy Now
Questions 32

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?

Options:

A.

Elliptic Curve

B.

NMD5

C.

RSA

D.

Diffie-Hellman

Buy Now
Questions 33

Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?

Options:

A.

WEP

B.

WPA

C.

WPA2

D.

TKIP

Buy Now
Questions 34

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

Options:

A.

Skipjack

B.

Blowfish

C.

MD5

D.

Serpent

Buy Now
Questions 35

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?

Options:

A.

Avalanche

B.

Confusion

C.

Scrambling

D.

Diffusion

Buy Now
Questions 36

Which method of password cracking takes the most time and effort?

Options:

A.

Dictionary attack

B.

Shoulder surfing

C.

Brute force

D.

Rainbow tables

Buy Now
Questions 37

The reverse process from encoding - converting the encoded message back into its plaintext format.

Options:

A.

Substitution

B.

Whitening

C.

Encoding

D.

Decoding

Buy Now
Questions 38

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?

Options:

A.

Me mod n

B.

Ce mod n

C.

y2 = x3 + Ax + B

D.

P = Cd mod n

Buy Now
Questions 39

Widely used, particularly with Microsoft operating systems. Created by MIT and derives its name from the mythical three headed dog. The is a great deal of verification for the tickets and the tickets expire quickly. Client authenticates to the Authentication Server once using a long term shared secret and receives back a Ticket-Granting Server. Client can reuse this ticket to get additional tickets without reusing the shared secret. These tickets are used to prove authentication to the Service Server.

Options:

A.

Diffie-Hellman

B.

Yarrow

C.

Kerberos

D.

ElGamal

Buy Now
Questions 40

The mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.

Options:

A.

Cipher-block chaining (CBC)

B.

Electronic codebook (ECB)

C.

Output feedback (OFB)

D.

Cipher feedback (CFB)

Buy Now
Questions 41

Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?

Options:

A.

Pegasus

B.

Blowfish

C.

SHA1

D.

AES

Buy Now
Questions 42

In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.

Options:

A.

Information deduction

B.

Total break

C.

Instance deduction

D.

Global deduction

Buy Now
Questions 43

Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.

Options:

A.

Cipher disk

B.

Caesar cipher

C.

Scytale

D.

Enigma machine

Buy Now
Questions 44

Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and CA. Receives request, authenticates it and forwards it to the CA.

Options:

A.

PKI (Public Key Infrastructure)

B.

TTP (Trusted Third Party)

C.

RA (Registration Authority)

D.

CP (Certificate Policy)

Buy Now
Questions 45

Which of the following statements is most true regarding binary operations and encryption?

Options:

A.

They can provide secure encryption

B.

They are only useful as a teaching method

C.

They can form a part of viable encryption methods

D.

They are completely useless

Buy Now
Questions 46

Uses a formula, M_n = 2^n − 1 where n is a prime number, to generate primes. Works for 2, 3, 5, 7 but fails on 11 and on many other n values.

Options:

A.

Fibonacci Numbers

B.

Co-prime Numbers

C.

Even Numbers

D.

Mersenne Primes

Buy Now
Questions 47

A linear congruential generator is an example of what?

Options:

A.

A coprime generator

B.

A prime number generator

C.

A pseudo random number generator

D.

A random number generator

Buy Now
Questions 48

Electromechanical rotor-based cipher used in World War II

Options:

A.

ROT13 Cipher

B.

Cipher Disk

C.

Enigma Machine

D.

Rail Fence Cipher

Buy Now
Questions 49

Which one of the following uses three different keys, all of the same size?

Options:

A.

3DES

B.

AES

C.

RSA

D.

DES

Buy Now
Questions 50

A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed

Options:

A.

Туре 1

B.

Туре 4

C.

Туре 2

D.

Туре 3

Buy Now
Questions 51

Which of the following techniques is used (other than brute force) to attempt to derive a key?

Options:

A.

Cryptography

B.

Cryptoanalysis

C.

Password cracking

D.

Hacking

Buy Now
Questions 52

Which of the following is generally true about key sizes?

Options:

A.

Larger key sizes increase security

B.

Key size is irrelevant to security

C.

Key sizes must be more than 256 bits to be secure

D.

Smaller key sizes increase security

Buy Now
Questions 53

During the process of encryption and decryption, what keys are shared?

Options:

A.

Public keys

B.

Public and private keys

C.

User passwords

D.

Private keys

Buy Now
Questions 54

Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?

Options:

A.

Differential Analysis

B.

Discrete Cosine Transform

C.

Raw Quick Pair

D.

Chi squared analysis

Buy Now
Questions 55

All of the following are key exchange protocols except for____

Options:

A.

MQV

B.

AES

C.

ECDH

D.

DH

Buy Now
Questions 56

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Options:

A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access 2 (WPA2)

C.

Wi-Fi Protected Access (WPA)

D.

Temporal Key Integrity Protocol (TKIP)

Buy Now
Questions 57

Storing private keys with a third party is referred to as what?

Options:

A.

Key caching

B.

Key storage

C.

Key banking

D.

Key escrow

Buy Now
Questions 58

Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.

Options:

A.

Decoding

B.

Substitution

C.

Transposition

D.

Collision

Buy Now
Questions 59

You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as

Options:

A.

Odd numbers with no divisors

B.

Odd numbers

C.

Any number only divisible by odd numbers

D.

Any number only divisible by one and itself

Buy Now
Questions 60

Which one of the following is an example of a symmetric key algorithm?

Options:

A.

ECC

B.

Diffie-Hellman

C.

RSA

D.

Rijndael

Buy Now
Questions 61

Which one of the following is an authentication method that sends the username and password in cleartext?

Options:

A.

PAP

B.

CHAP

C.

Kerberos

D.

SPAP

Buy Now
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Apr 18, 2024
Questions: 206

PDF + Testing Engine

$64  $159.99

Testing Engine

$48  $119.99
buy now 212-81 testing engine

PDF (Q&A)

$40  $99.99
buy now 212-81 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 23 Apr 2024