Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

212-81 Sample Questions Answers

Questions 4

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

Options:

A.

Key Schedule

B.

Feistel Network

C.

SHA-2

D.

Diffie-Helman

Buy Now
Questions 5

What is a salt?

Options:

A.

Key whitening

B.

Random bits intermixed with a symmetric cipher to increase randomness and make it more secure

C.

Key rotation

D.

Random bits intermixed with a hash to increase randomness and reduce collisions

Buy Now
Questions 6

A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.

Options:

A.

Chosen Plaintext Attack

B.

Steganography

C.

Rainbow Tables

D.

Transposition

Buy Now
Questions 7

A cryptanalysis success where the attacker deduces the secret key.

Options:

A.

Information Deduction

B.

Avalanche effect

C.

Shannon's Entropy

D.

Total Break

Buy Now
Questions 8

A _____ is a function is not reversible.

Options:

A.

Stream cipher

B.

Asymmetric cipher

C.

Hash

D.

Block Cipher

Buy Now
Questions 9

Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?

Options:

A.

A substitution box where input bits are replaced

B.

A black box for the algorithm implementation

C.

A shifting box where input bits are shifted

D.

Another name for the round function

Buy Now
Questions 10

Which one of the following terms describes two numbers that have no common factors?

Options:

A.

Coprime

B.

Fermat's number

C.

Euler's totient

D.

Convergent

Buy Now
Questions 11

Which one of the following is an example of a symmetric key algorithm?

Options:

A.

ECC

B.

Diffie-Hellman

C.

RSA

D.

Rijndael

Buy Now
Questions 12

This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.

Options:

A.

RC4

B.

Blowfish

C.

Twofish

D.

FISH

Buy Now
Questions 13

What is the largest key size that AES can use?

Options:

A.

256

B.

56

C.

512

D.

128

Buy Now
Questions 14

You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as

Options:

A.

Odd numbers with no divisors

B.

Odd numbers

C.

Any number only divisible by odd numbers

D.

Any number only divisible by one and itself

Buy Now
Questions 15

An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.

Options:

A.

Differential Cryptanalysis

B.

Linear Cryptanalysis

C.

Chosen Plaintext Attack

D.

Integral Cryptanalysis

Buy Now
Questions 16

Which of the following is an asymmetric cipher?

Options:

A.

RSA

B.

AES

C.

DES

D.

RC4

Buy Now
Questions 17

A cipher is defined as what

Options:

A.

The algorithm(s) needed to encrypt and decrypt a message

B.

Encrypted text

C.

The key used to encrypt a message

D.

Any algorithm used in cryptography

Buy Now
Questions 18

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

Options:

A.

SHA-0

B.

SHA-2

C.

SHA-1

D.

SHA-3

Buy Now
Questions 19

Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.

Options:

A.

Certificate Authority

B.

Raw Quick Pair

C.

Chi-Square Analysis

D.

SP network

Buy Now
Questions 20

What is a variation of DES that uses a technique called Key Whitening?

Options:

A.

Blowfish

B.

DESX

C.

3DES

D.

AES

Buy Now
Questions 21

What best describes the shifting of each letter a fixed number of spaces to the left or right?

Options:

A.

Single substitution

B.

Multi substitution

C.

XOR

D.

Bit shifting

Buy Now
Questions 22

What is the basis for the difficulty in breaking RSA?

Options:

A.

Hashing

B.

The birthday paradox

C.

Equations that describe an elliptic curve

D.

Factoring numbers

Buy Now
Questions 23

Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.

Options:

A.

VPN

B.

PGP

C.

Cryptool

D.

VeraCrypt

Buy Now
Questions 24

If you use substitution alone, what weakness is present in the resulting cipher text?

Options:

A.

It is the same length as the original text

B.

It is easily broken with modern computers

C.

It maintains letter and word frequency

D.

It is too simple

Buy Now
Questions 25

Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.

Options:

A.

Scytale Cipher

B.

Playfair Cipher

C.

Homophonic Substitution

D.

ADFVGX Cipher

Buy Now
Questions 26

What does the OCSP protocol provide?

Options:

A.

Revoked certificates

B.

Hashing

C.

VPN connectivity

D.

Encryption

Buy Now
Questions 27

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?

Options:

A.

Complete diffusion

B.

Complete scrambling

C.

Complete confusion

D.

Complete avalanche

Buy Now
Questions 28

John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?

Options:

A.

Kerberos

B.

EAP

C.

Radius

D.

CHAP

Buy Now
Questions 29

Denis is looking at an older system that uses DES encryption. A colleague has told him that DES is insecure due to a small key size. What is the key length used for DES?

Options:

A.

128

B.

256

C.

56

D.

64

Buy Now
Questions 30

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

Options:

A.

128 bit and CRC

B.

128 bi and TKIP

C.

128 bit and CCMP

D.

64 bit and CCMP

Buy Now
Questions 31

Which one of the following is a component of the PKI?

Options:

A.

CA

B.

TGS

C.

OCSP

D.

TGT

Buy Now
Questions 32

A real time protocol for verifying certificates (and a newer method than CRL).

Options:

A.

Online Certificate Status Protocol (OCSP)

B.

Server-based Certificate Validation Protocol (SCVP)

C.

Public Key Infrastructure (PKI)

D.

Registration Authority (RA)

Buy Now
Questions 33

Which of the following is not a key size used by AES?

Options:

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 b

Buy Now
Questions 34

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

Options:

A.

SHA2

B.

MD5

C.

MD4

D.

PIKE

Buy Now
Questions 35

An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.

Options:

A.

CHAP

B.

SPAP

C.

PAP

D.

EAP

Buy Now
Questions 36

In a Feistel cipher, the two halves of the block are swapped in each round. What does this provide?

Options:

A.

Diffusion

B.

Confusion

C.

Avalanche

D.

Substitution

Buy Now
Questions 37

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?

Options:

A.

Me mod n

B.

Ce mod n

C.

y2 = x3 + Ax + B

D.

P = Cd mod n

Buy Now
Questions 38

The most common way steganography is accomplished is via which one of the following?

Options:

A.

rsb

B.

Isb

C.

msb

D.

asb

Buy Now
Questions 39

_____ uses at least two different shifts, changing the shift with different letters in the plain text.

Options:

A.

Caesar cipher

B.

multi-alphabet encryption

C.

Scytale

D.

Atbash

Buy Now
Questions 40

If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.

Options:

A.

15

B.

16

C.

3

D.

4

Buy Now
Questions 41

RFC 1321 describes what hash?

Options:

A.

RIPEMD

B.

GOST

C.

SHA1

D.

MD5

Buy Now
Questions 42

A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.

Options:

A.

Registration Authority

B.

Payload

C.

OCSP

D.

Digital Certificate

Buy Now
Questions 43

Which of the following is a key exchange protocol?

Options:

A.

MQV

B.

AES

C.

DES

D.

RSA

Buy Now
Questions 44

A number that is used only one time, then discarded is called what?

Options:

A.

IV

B.

Nonce

C.

Chain

D.

Salt

Buy Now
Questions 45

What size block does Skipjack use?

Options:

A.

64

B.

512

C.

128

D.

256

Buy Now
Questions 46

Which of the following statements is most true regarding binary operations and encryption?

Options:

A.

They can provide secure encryption

B.

They are only useful as a teaching method

C.

They can form a part of viable encryption methods

D.

They are completely useless

Buy Now
Questions 47

With Cipher-block chaining (CBC) what happens?

Options:

A.

The block cipher is turned into a stream cipher

B.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

C.

Each block of plaintext is XORed with the previous ciphertext block before being encrypted

D.

The cipher text from the current round is XORed with the plaintext for the next round

Buy Now
Questions 48

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?

Options:

A.

Elliptic Curve

B.

NMD5

C.

RSA

D.

Diffie-Hellman

Buy Now
Questions 49

Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?

Options:

A.

Block cipher

B.

Asymmetric

C.

Symmetric

D.

Stream cipher

Buy Now
Questions 50

Which of the following encryption algorithms relies on the inability to factor large prime numbers?

Options:

A.

RSA

B.

MQV

C.

EC

D.

AES

Buy Now
Questions 51

What is the basis for the FISH algorithm?

Options:

A.

The Lagged Fibonacci generator

B.

Prime number theory

C.

Equations that describe an ellipse

D.

The difficulty in factoring numbers

Buy Now
Questions 52

Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?

Options:

A.

Atbash

B.

Caesar

C.

Scytale

D.

Vigenere

Buy Now
Questions 53

A ______ refers to a situation where two different inputs yield the same output.

Options:

A.

Convergence

B.

Collision

C.

Transposition

D.

Substitution

Buy Now
Questions 54

If the round function is a cryptographically secure pseudorandom function, then ___________ rounds is sufficient to make the block cipher a pseudorandom permutation.

Options:

A.

2

B.

15

C.

16

D.

3

Buy Now
Questions 55

Bob’s password is hashed, and so is John’s. Even though they used different passwords, the hash is the same. What is this called?

Options:

A.

A collision

B.

A mistake

C.

Convergence

D.

Transposition

Buy Now
Questions 56

If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?

Options:

A.

Alice's private key

B.

Bob's private key

C.

Alice's public key

D.

Bob's public key

Buy Now
Questions 57

Which one of the following is a symmetric key system using 64-bit blocks?

Options:

A.

DES

B.

PGP

C.

DSA

D.

RSA

Buy Now
Questions 58

A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed

Options:

A.

Туре 1

B.

Туре 4

C.

Туре 2

D.

Туре 3

Buy Now
Questions 59

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.

Options:

A.

PKI

B.

GOST

C.

CA

D.

PIKE

Buy Now
Questions 60

What is an IV?

Options:

A.

Random bits added to a hash

B.

The key used for a cryptography algorith

C.

A fixed size random stream that is added to a block cipher to increase randomeness

D.

The cipher used

Buy Now
Questions 61

You are trying to find a modern method for security web traffic for use in your company's ecommerce web site. Which one of the following is used to encrypt web pages and uses bilateral authentication?

Options:

A.

AES

B.

SSL

C.

TLS

D.

3DES

Buy Now
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Nov 15, 2024
Questions: 206
$64  $159.99
$48  $119.99
$40  $99.99
buy now 212-81