Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

212-81 EC-Council Certified Encryption Specialist (ECES) Questions and Answers

Questions 4

A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.

Options:

A.

Blum Blum Shub

B.

Elliptic Curve

C.

Menezes-Qu-Vanstone

D.

Euler's totient

Buy Now
Questions 5

A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.

Options:

A.

Chosen Plaintext Attack

B.

Steganography

C.

Rainbow Tables

D.

Transposition

Buy Now
Questions 6

You are explaining the details of the AES algorithm to cryptography students. You are discussing the derivation of the round keys from the shared symmetric key. The portion of AES where round keys are derived from the cipher key using Rijndael's key schedule is called what?

Options:

A.

The key expansion phase

B.

The round key phase

C.

The bit shifting phase

D.

The initial round

Buy Now
Questions 7

The ATBASH cipher is best described as what type of cipher?

Options:

A.

Asymmetric

B.

Symmetric

C.

Substitution

D.

Transposition

Buy Now
Questions 8

John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)

Options:

A.

Encrypt mode

B.

Transport mode

C.

Tunnel mode

D.

Decrypt mode

Buy Now
Questions 9

What is Kerchoff's principle?

Options:

A.

A minimum of 15 rounds is needed for a Feistel cipher to be secure

B.

Only the key needs to be secret, not the actual algorithm

C.

Both algorithm and key should be kept secret

D.

A minimum key size of 256 bits is necessary for security

Buy Now
Questions 10

The most common way steganography is accomplished is via which one of the following?

Options:

A.

rsb

B.

Isb

C.

msb

D.

asb

Buy Now
Questions 11

If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.

Options:

A.

15

B.

16

C.

3

D.

4

Buy Now
Questions 12

Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and CA. Receives request, authenticates it and forwards it to the CA.

Options:

A.

PKI (Public Key Infrastructure)

B.

TTP (Trusted Third Party)

C.

RA (Registration Authority)

D.

CP (Certificate Policy)

Buy Now
Questions 13

Which of the following algorithms uses three different keys to encrypt the plain text?

Options:

A.

Skipjack

B.

AES

C.

Blowfish

D.

3DES

Buy Now
Questions 14

What is a variation of DES that uses a technique called Key Whitening?

Options:

A.

Blowfish

B.

DESX

C.

3DES

D.

AES

Buy Now
Questions 15

Which one of the following is an example of a symmetric key algorithm?

Options:

A.

ECC

B.

Diffie-Hellman

C.

RSA

D.

Rijndael

Buy Now
Questions 16

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

Options:

A.

128 bit and CRC

B.

128 bi and TKIP

C.

128 bit and CCMP

D.

64 bit and CCMP

Buy Now
Questions 17

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?

Options:

A.

Complete diffusion

B.

Complete scrambling

C.

Complete confusion

D.

Complete avalanche

Buy Now
Questions 18

Which of the following is a key exchange protocol?

Options:

A.

MQV

B.

AES

C.

DES

D.

RSA

Buy Now
Questions 19

A non-secret binary vector used as the initializing input algorithm for encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.

Options:

A.

IV

B.

Salt

C.

L2TP

D.

Nonce

Buy Now
Questions 20

A list of certificates that have been revoked.

Options:

A.

CA

B.

CRL

C.

PCBC

D.

OCSP

Buy Now
Questions 21

If you use substitution alone, what weakness is present in the resulting cipher text?

Options:

A.

It is the same length as the original text

B.

It is easily broken with modern computers

C.

It maintains letter and word frequency

D.

It is too simple

Buy Now
Questions 22

Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Options:

A.

WEP2

B.

WPA

C.

WEP

D.

WPA2

Buy Now
Questions 23

A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.

Options:

A.

Total Break

B.

Distinguishing Algorithm

C.

Instance Deduction

D.

Information Deduction

Buy Now
Questions 24

Which method of password cracking takes the most time and effort?

Options:

A.

Dictionary attack

B.

Shoulder surfing

C.

Brute force

D.

Rainbow tables

Buy Now
Questions 25

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

Options:

A.

Keyed Hashing

B.

Double Hashing

C.

Salting

D.

Key Stretching

Buy Now
Questions 26

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Options:

A.

WEP

B.

WEP2

C.

WPA

D.

WPA2

Buy Now
Questions 27

You are trying to find a modern method for security web traffic for use in your company's ecommerce web site. Which one of the following is used to encrypt web pages and uses bilateral authentication?

Options:

A.

AES

B.

SSL

C.

TLS

D.

3DES

Buy Now
Questions 28

Which of the following is required for a hash?

Options:

A.

Not vulnerable to a brute force attack

B.

Few collisions

C.

Must use SALT

D.

Not reversible

E.

Variable length input, fixed length output

F.

Minimum key length

Buy Now
Questions 29

Which of the following are valid key sizes for AES (choose three)?

Options:

A.

192

B.

56

C.

256

D.

128

E.

512

F.

64

Buy Now
Questions 30

A measure of the uncertainty associated with a random variable.

Options:

A.

Collision

B.

Whitening

C.

Diffusion

D.

Entropy

Buy Now
Questions 31

A real time protocol for verifying certificates (and a newer method than CRL).

Options:

A.

Online Certificate Status Protocol (OCSP)

B.

Server-based Certificate Validation Protocol (SCVP)

C.

Public Key Infrastructure (PKI)

D.

Registration Authority (RA)

Buy Now
Questions 32

The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.

Options:

A.

ElGamal

B.

RSA

C.

PAP

D.

X.509

Buy Now
Questions 33

A technique used to increase the security of block ciphers. It consists of steps that combine the data with portions of the key (most commonly using a simple XOR) before the first round and after the last round of encryption.

Options:

A.

Whitening

B.

Key Exchange

C.

Key Schedule

D.

Key Clustering

Buy Now
Questions 34

A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.

Options:

A.

ADFVGX Cipher

B.

ROT13 Cipher

C.

Book Ciphers

D.

Cipher Disk

Buy Now
Questions 35

Which of the following statements is most true regarding binary operations and encryption?

Options:

A.

They can provide secure encryption

B.

They are only useful as a teaching method

C.

They can form a part of viable encryption methods

D.

They are completely useless

Buy Now
Questions 36

Symmetric algorithm. Designed by James Massey and Xuejia Lai. Operates on 64 bit blocks and has a 128 bit key. Consists of 8 identical transformations each round and an output transformation.

Options:

A.

IDEA

B.

RSA

C.

CAST

D.

DES

Buy Now
Questions 37

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Options:

A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access 2 (WPA2)

C.

Wi-Fi Protected Access (WPA)

D.

Temporal Key Integrity Protocol (TKIP)

Buy Now
Questions 38

A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?

Options:

A.

SHA1

B.

MD5

C.

FORK

D.

RIPEMD

Buy Now
Questions 39

Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?

Options:

A.

Caesar cipher

B.

RSA

C.

PGP

D.

DES

Buy Now
Questions 40

An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.

Options:

A.

CHAP

B.

SPAP

C.

PAP

D.

EAP

Buy Now
Questions 41

Which of the following is an asymmetric algorithm that was first publically described in 1977?

Options:

A.

Elliptic Curve

B.

Twofish

C.

DESX

D.

RSA

Buy Now
Questions 42

What must occur in order for a cipher to be considered ‘broken’?

Options:

A.

Uncovering the algorithm used

B.

Decoding the key

C.

Finding any method that is more efficient than brute force

D.

Rendering the cipher no longer useable

Buy Now
Questions 43

Which algorithm implements an unbalanced Feistel cipher?

Options:

A.

Skipjack

B.

RSA

C.

3DES

D.

Blowfish

Buy Now
Questions 44

A ______ refers to a situation where two different inputs yield the same output.

Options:

A.

Convergence

B.

Collision

C.

Transposition

D.

Substitution

Buy Now
Questions 45

If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?

Options:

A.

Alice's private key

B.

Bob's private key

C.

Alice's public key

D.

Bob's public key

Buy Now
Questions 46

What size block does AES work on?

Options:

A.

64

B.

128

C.

192

D.

256

Buy Now
Questions 47

What does the OCSP protocol provide?

Options:

A.

Revoked certificates

B.

Hashing

C.

VPN connectivity

D.

Encryption

Buy Now
Questions 48

If you wished to see a list of revoked certificates from a CA, where would you look?

Options:

A.

RA

B.

RFC

C.

CRL

D.

CA

Buy Now
Questions 49

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

Options:

A.

SHA2

B.

MD5

C.

MD4

D.

PIKE

Buy Now
Questions 50

What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?

Options:

A.

Chosen plaintext

B.

Differential cryptanalysis

C.

Known-plaintext attack

D.

Kasiski examination

Buy Now
Questions 51

A symmetric Stream Cipher published by the German engineering firm Seimans in 1993. A software based stream cipher that uses a Lagged Fibonacci generator along with concepts borrowed from shrinking generator ciphers.

Options:

A.

DESX

B.

FISH

C.

Twofish

D.

IDEA

Buy Now
Questions 52

What size key does Skipjack use?

Options:

A.

128 bit

B.

56 bit

C.

80 bit

D.

256 bit

Buy Now
Questions 53

A number that is used only one time, then discarded is called what?

Options:

A.

IV

B.

Nonce

C.

Chain

D.

Salt

Buy Now
Questions 54

This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.

Options:

A.

SHA-256

B.

FORK-256

C.

SHA-1

D.

RSA

Buy Now
Questions 55

This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.

Options:

A.

RC4

B.

Blowfish

C.

Twofish

D.

FISH

Buy Now
Questions 56

Which of the following equations is related to EC?

Options:

A.

P = Cd%n

B.

Me%n

C.

y^2 = x^3 + Ax + B

D.

Let m = (p-1)(q-1)

Buy Now
Questions 57

Which of the following is a substitution cipher used by ancient Hebrew scholars?

Options:

A.

Atbash

B.

Vigenere

C.

Caesar

D.

Scytale

Buy Now
Questions 58

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ________ integrity check mechanism provides security against a replay attack.

Options:

A.

CBC-MAC

B.

CRC-MAC

C.

CRC-32

D.

CBC-32

Buy Now
Questions 59

Message hidden in unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind.

Options:

A.

Caesar Cipher

B.

Null Ciphers

C.

Vigenere Cipher

D.

Playfair Cipher

Buy Now
Questions 60

3DES can best be classified as which one of the following?

Options:

A.

Digital signature

B.

Symmetric algorithm

C.

Asymmetric algorithm

D.

Hashing algorithm

Buy Now
Questions 61

Which of the following would be the weakest encryption algorithm?

Options:

A.

DES

B.

AES

C.

RSA

D.

EC

Buy Now
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: May 1, 2024
Questions: 206
212-81 pdf

212-81 PDF

$28  $80
212-81 Engine

212-81 Testing Engine

$33.25  $95
212-81 PDF + Engine

212-81 PDF + Testing Engine

$45.5  $130