New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

ECCouncil 212-81 EC-Council Certified Encryption Specialist (ECES) Exam Practice Test

Page: 1 / 21
Total 206 questions

EC-Council Certified Encryption Specialist (ECES) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Bob’s password is hashed, and so is John’s. Even though they used different passwords, the hash is the same. What is this called?

Options:

A.

A collision

B.

A mistake

C.

Convergence

D.

Transposition

Question 2

What type of encryption uses different keys to encrypt and decrypt the message?

Options:

A.

Asymmetric

B.

Symmetric

C.

Secure

D.

Private key

Question 3

Symmetric algorithm. Designed by James Massey and Xuejia Lai. Operates on 64 bit blocks and has a 128 bit key. Consists of 8 identical transformations each round and an output transformation.

Options:

A.

IDEA

B.

RSA

C.

CAST

D.

DES

Question 4

What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?

Options:

A.

Chosen plaintext

B.

Differential cryptanalysis

C.

Known-plaintext attack

D.

Kasiski examination

Question 5

You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as

Options:

A.

Odd numbers with no divisors

B.

Odd numbers

C.

Any number only divisible by odd numbers

D.

Any number only divisible by one and itself

Question 6

During the process of encryption and decryption, what keys are shared?

Options:

A.

Public keys

B.

Public and private keys

C.

User passwords

D.

Private keys

Question 7

A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.

Options:

A.

Blum Blum Shub

B.

Elliptic Curve

C.

Menezes-Qu-Vanstone

D.

Euler's totient

Question 8

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.

Options:

A.

PKI

B.

GOST

C.

CA

D.

PIKE

Question 9

Which one of the following is a component of the PKI?

Options:

A.

CA

B.

TGS

C.

OCSP

D.

TGT

Question 10

Which of the following is not a key size used by AES?

Options:

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 b

Question 11

Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.

Options:

A.

Key Schedule

B.

Key Clustering

C.

Key Space

D.

Key Exchange

Question 12

A cryptanalysis success where the attacker deduces the secret key.

Options:

A.

Information Deduction

B.

Avalanche effect

C.

Shannon's Entropy

D.

Total Break

Question 13

The ATBASH cipher is best described as what type of cipher?

Options:

A.

Asymmetric

B.

Symmetric

C.

Substitution

D.

Transposition

Question 14

Widely used, particularly with Microsoft operating systems. Created by MIT and derives its name from the mythical three headed dog. The is a great deal of verification for the tickets and the tickets expire quickly. Client authenticates to the Authentication Server once using a long term shared secret and receives back a Ticket-Granting Server. Client can reuse this ticket to get additional tickets without reusing the shared secret. These tickets are used to prove authentication to the Service Server.

Options:

A.

Diffie-Hellman

B.

Yarrow

C.

Kerberos

D.

ElGamal

Question 15

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

Options:

A.

Key distribution

B.

Security

C.

Scalability

D.

Speed

Question 16

The time and effort required to break a security measure.

Options:

A.

Session Key

B.

Work factor

C.

Non-repudiation

D.

Payload

Question 17

Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?

Options:

A.

A substitution box where input bits are replaced

B.

A black box for the algorithm implementation

C.

A shifting box where input bits are shifted

D.

Another name for the round function

Question 18

What is the largest key size that AES can use?

Options:

A.

256

B.

56

C.

512

D.

128

Question 19

What does the OCSP protocol provide?

Options:

A.

Revoked certificates

B.

Hashing

C.

VPN connectivity

D.

Encryption

Question 20

Which of the following equations is related to EC?

Options:

A.

P = Cd%n

B.

Me%n

C.

y^2 = x^3 + Ax + B

D.

Let m = (p-1)(q-1)

Question 21

Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?

Options:

A.

RSA

B.

AES

C.

RC4

D.

SHA-1

Question 22

The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.

Options:

A.

Steganography

B.

Cryptosystem

C.

Avalanche effect

D.

Key Schedule

Question 23

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?

Options:

A.

Avalanche

B.

Confusion

C.

Scrambling

D.

Diffusion

Question 24

What is Kerchoff's principle?

Options:

A.

A minimum of 15 rounds is needed for a Feistel cipher to be secure

B.

Only the key needs to be secret, not the actual algorithm

C.

Both algorithm and key should be kept secret

D.

A minimum key size of 256 bits is necessary for security

Question 25

Which of the following is generally true about key sizes?

Options:

A.

Larger key sizes increase security

B.

Key size is irrelevant to security

C.

Key sizes must be more than 256 bits to be secure

D.

Smaller key sizes increase security

Question 26

What is the formula m^e %n related to?

Options:

A.

Encrypting with EC

B.

Decrypting with RSA

C.

Generating Mersenne primes

D.

Encrypting with RSA

Question 27

Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?

Options:

A.

160

B.

512

C.

256

D.

128

Question 28

If the round function is a cryptographically secure pseudorandom function, then ___________ rounds is sufficient to make the block cipher a pseudorandom permutation.

Options:

A.

2

B.

15

C.

16

D.

3

Question 29

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?

Options:

A.

Vigenere's principle

B.

Shamir's principle

C.

Kerkchoff's principle

D.

Babbage's principle

Question 30

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

Options:

A.

Keyed Hashing

B.

Double Hashing

C.

Salting

D.

Key Stretching

Question 31

Which of the following is a substitution cipher used by ancient Hebrew scholars?

Options:

A.

Atbash

B.

Vigenere

C.

Caesar

D.

Scytale

Question 32

You are studying classic ciphers. You have been examining the difference between single substitution and multi-substitution. Which one of the following is an example of a multi-alphabet cipher?

Options:

A.

Rot13

B.

Caesar

C.

Atbash

D.

Vigenère

Question 33

A _____ is a function that takes a variable-size input m and returns a fixed-size string.

Options:

A.

Feistel

B.

Asymmetric cipher

C.

Symmetric cipher

D.

Hash

Question 34

Which of the following is used to encrypt email and create digital signatures?

Options:

A.

DES

B.

SHA1

C.

AES

D.

RSA

Question 35

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

Options:

A.

SHA1

B.

SHA-256

C.

RSA

D.

MD5

Question 36

A ______ refers to a situation where two different inputs yield the same output.

Options:

A.

Convergence

B.

Collision

C.

Transposition

D.

Substitution

Question 37

What size block does AES work on?

Options:

A.

64

B.

128

C.

192

D.

256

Question 38

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.

Options:

A.

Digital Signature

B.

Hash

C.

Ownership stamp

D.

Digest

Question 39

When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.

Options:

A.

Mersenne's number

B.

Fermat's number

C.

Euler's totient

D.

Fermat's prime

Question 40

MD5 can best be described as which one of the following?

Options:

A.

Asymmetric algorithm

B.

Hashing algorithm

C.

Digital signature

D.

Symmetric algorithm

Question 41

If you use substitution alone, what weakness is present in the resulting cipher text?

Options:

A.

It is the same length as the original text

B.

It is easily broken with modern computers

C.

It maintains letter and word frequency

D.

It is too simple

Question 42

Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.

Options:

A.

VPN

B.

PGP

C.

Cryptool

D.

VeraCrypt

Question 43

A symmetric Stream Cipher published by the German engineering firm Seimans in 1993. A software based stream cipher that uses a Lagged Fibonacci generator along with concepts borrowed from shrinking generator ciphers.

Options:

A.

DESX

B.

FISH

C.

Twofish

D.

IDEA

Question 44

Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.

Options:

A.

CLR

B.

OCSP

C.

TLS

D.

IPSec

Question 45

Which of the following is an asymmetric cipher?

Options:

A.

RSA

B.

AES

C.

DES

D.

RC4

Question 46

What is a TGS?

Options:

A.

The server that escrows keys

B.

A protocol for encryption

C.

A protocol for key exchange

D.

The server that grants Kerberos tickets

Question 47

John is trying to explain the basics of cryptography to a group of young, novice, security students. Which one of the following most accurately defines encryption?

Options:

A.

Changing a message using complex mathematics

B.

Applying keys to a message to conceal it

C.

Complex mathematics to conceal a message

D.

Changing a message so it can only be easily read by the intended recipient

Question 48

A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.

Options:

A.

Registration Authority

B.

Payload

C.

OCSP

D.

Digital Certificate

Question 49

Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?

Options:

A.

Pegasus

B.

Blowfish

C.

SHA1

D.

AES

Question 50

A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?

Options:

A.

SHA1

B.

MD5

C.

FORK

D.

RIPEMD

Question 51

Which of the following acts as a verifier for the certificate authority?

Options:

A.

Certificate Management system

B.

Directory management system

C.

Registration authority

D.

Certificate authority

Question 52

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Options:

A.

WEP

B.

WEP2

C.

WPA

D.

WPA2

Question 53

Which of the following is an asymmetric algorithm that was first publically described in 1977?

Options:

A.

Elliptic Curve

B.

Twofish

C.

DESX

D.

RSA

Question 54

Frank is trying to break into an encrypted file… He is attempting all the possible keys that could be used for this algorithm. Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?

Options:

A.

Rainbow table

B.

Frequency analysis

C.

Brute force

D.

Kasiski

Question 55

With Cipher feedback (CFB) what happens?

Options:

A.

The key is reapplied

B.

The ciphertext block is encrypted then the ciphertext produced is XOR’d back with the plaintext to produce the current ciphertext block

C.

The block cipher is turned into a stream cipher

D.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

Question 56

Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.

Options:

A.

Keccak

B.

MD5

C.

SHA-1

D.

TIGER

Question 57

Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?

Options:

A.

Differential Analysis

B.

Discrete Cosine Transform

C.

Raw Quick Pair

D.

Chi squared analysis

Question 58

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.

Options:

A.

Rail Fence Cipher

B.

Null Cipher

C.

Vigenere Cipher

D.

ROT-13

Question 59

What size block does Skipjack use?

Options:

A.

64

B.

512

C.

128

D.

256

Question 60

Electromechanical rotor-based cipher used in World War II

Options:

A.

ROT13 Cipher

B.

Cipher Disk

C.

Enigma Machine

D.

Rail Fence Cipher

Question 61

Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.

Options:

A.

Linear cryptanalysis

B.

Replay attack

C.

Side-channel attack

D.

Social engineering attack

Page: 1 / 21
Total 206 questions