Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

ECCouncil 212-81 EC-Council Certified Encryption Specialist (ECES) Exam Practice Test

Page: 1 / 21
Total 206 questions

EC-Council Certified Encryption Specialist (ECES) Questions and Answers

Question 1

A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.

Options:

A.

Chosen Plaintext Attack

B.

Steganography

C.

Rainbow Tables

D.

Transposition

Question 2

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

Options:

A.

IPsec Policy Agent

B.

Internet Key Exchange (IKE)

C.

Oakley

D.

IPsec driver

Question 3

Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?

Options:

A.

K4

B.

K5

C.

K3

D.

K2

E.

K1

Question 4

What is the largest key size that AES can use?

Options:

A.

256

B.

56

C.

512

D.

128

Question 5

A _____ is a function is not reversible.

Options:

A.

Stream cipher

B.

Asymmetric cipher

C.

Hash

D.

Block Cipher

Question 6

Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.

Options:

A.

TIGER

B.

GOST

C.

BEAR

D.

FORK-256

Question 7

What must occur in order for a cipher to be considered ‘broken’?

Options:

A.

Uncovering the algorithm used

B.

Decoding the key

C.

Finding any method that is more efficient than brute force

D.

Rendering the cipher no longer useable

Question 8

In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?

Options:

A.

IPSec does not involve gateways

B.

Only transport mode can be used

C.

Encapsulating Security Payload (ESP) authentication must be used

D.

Only the tunnel mode can be used

Question 9

Which of the following is a key exchange protocol?

Options:

A.

MQV

B.

AES

C.

DES

D.

RSA

Question 10

Denis is looking at an older system that uses DES encryption. A colleague has told him that DES is insecure due to a small key size. What is the key length used for DES?

Options:

A.

128

B.

256

C.

56

D.

64

Question 11

What size key does Skipjack use?

Options:

A.

128 bit

B.

56 bit

C.

80 bit

D.

256 bit

Question 12

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

Options:

A.

128 bit and CRC

B.

128 bi and TKIP

C.

128 bit and CCMP

D.

64 bit and CCMP

Question 13

Which of the following is not a key size used by AES?

Options:

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 b

Question 14

A real time protocol for verifying certificates (and a newer method than CRL).

Options:

A.

Online Certificate Status Protocol (OCSP)

B.

Server-based Certificate Validation Protocol (SCVP)

C.

Public Key Infrastructure (PKI)

D.

Registration Authority (RA)

Question 15

A list of certificates that have been revoked.

Options:

A.

CA

B.

CRL

C.

PCBC

D.

OCSP

Question 16

Which of the following is an asymmetric algorithm that was first publically described in 1977?

Options:

A.

Elliptic Curve

B.

Twofish

C.

DESX

D.

RSA

Question 17

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

Options:

A.

SHA1

B.

SHA-256

C.

RSA

D.

MD5

Question 18

Which of the following acts as a verifier for the certificate authority?

Options:

A.

Certificate Management system

B.

Directory management system

C.

Registration authority

D.

Certificate authority

Question 19

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?

Options:

A.

Elliptic Curve

B.

NMD5

C.

RSA

D.

Diffie-Hellman

Question 20

During the process of encryption and decryption, what keys are shared?

Options:

A.

Public keys

B.

Public and private keys

C.

User passwords

D.

Private keys

Question 21

Which one of the following attempts to hide data in plain view?

Options:

A.

Cryptography

B.

Substitution

C.

Steganography

D.

Asymmetric cryptography

Question 22

A number that is used only one time, then discarded is called what?

Options:

A.

IV

B.

Nonce

C.

Chain

D.

Salt

Question 23

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

Options:

A.

Key Schedule

B.

Feistel Network

C.

SHA-2

D.

Diffie-Helman

Question 24

A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.

Options:

A.

Registration Authority

B.

Payload

C.

OCSP

D.

Digital Certificate

Question 25

Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.

Options:

A.

CLR

B.

OCSP

C.

TLS

D.

IPSec

Question 26

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?

Options:

A.

Complete diffusion

B.

Complete scrambling

C.

Complete confusion

D.

Complete avalanche

Question 27

What does Output feedback (OFB) do:

Options:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

A block cipher is converted into a stream cipher by generating a keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext

D.

The cipher text from the current round is XORed with the plaintext for the next round

Question 28

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?

Options:

A.

Vigenere's principle

B.

Shamir's principle

C.

Kerkchoff's principle

D.

Babbage's principle

Question 29

Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?

Options:

A.

Block cipher

B.

Asymmetric

C.

Symmetric

D.

Stream cipher

Question 30

Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.

Options:

A.

Scytale Cipher

B.

Playfair Cipher

C.

Homophonic Substitution

D.

ADFVGX Cipher

Question 31

A ______ refers to a situation where two different inputs yield the same output.

Options:

A.

Convergence

B.

Collision

C.

Transposition

D.

Substitution

Question 32

Which one of the following are characteristics of a hash function? (Choose two)

Options:

A.

Requires a key

B.

One-way

C.

Fixed length output

D.

Symmetric

E.

Fast

Question 33

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Options:

A.

WEP

B.

WEP2

C.

WPA

D.

WPA2

Question 34

In 1977 researchers and MIT described what asymmetric algorithm?

Options:

A.

DH

B.

RSA

C.

AES

D.

EC

Question 35

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Options:

A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access 2 (WPA2)

C.

Wi-Fi Protected Access (WPA)

D.

Temporal Key Integrity Protocol (TKIP)

Question 36

John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)

Options:

A.

Encrypt mode

B.

Transport mode

C.

Tunnel mode

D.

Decrypt mode

Question 37

Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.

Options:

A.

Decoding

B.

Substitution

C.

Transposition

D.

Collision

Question 38

If you use substitution alone, what weakness is present in the resulting cipher text?

Options:

A.

It is the same length as the original text

B.

It is easily broken with modern computers

C.

It maintains letter and word frequency

D.

It is too simple

Question 39

What size block does FORK256 use?

Options:

A.

64

B.

512

C.

256

D.

128

Question 40

____________cryptography uses one key to encrypt a message and a different key to decrypt it.

Options:

A.

Secure

B.

Asymmetric

C.

Stream

D.

Symmetric

Question 41

A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?

Options:

A.

SHA1

B.

MD5

C.

FORK

D.

RIPEMD

Question 42

Which of the following encryption algorithms relies on the inability to factor large prime numbers?

Options:

A.

RSA

B.

MQV

C.

EC

D.

AES

Question 43

What is a variation of DES that uses a technique called Key Whitening?

Options:

A.

Blowfish

B.

DESX

C.

3DES

D.

AES

Question 44

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.

Options:

A.

Rail Fence Cipher

B.

Null Cipher

C.

Vigenere Cipher

D.

ROT-13

Question 45

Which of the following is required for a hash?

Options:

A.

Not vulnerable to a brute force attack

B.

Few collisions

C.

Must use SALT

D.

Not reversible

E.

Variable length input, fixed length output

F.

Minimum key length

Question 46

Which of the following is a protocol for exchanging keys?

Options:

A.

DH

B.

EC

C.

AES

D.

RSA

Question 47

If you wished to see a list of revoked certificates from a CA, where would you look?

Options:

A.

RA

B.

RFC

C.

CRL

D.

CA

Question 48

Which of the following uses an 80 bit key on 64 bit blocks?

Options:

A.

Skipjack

B.

Twofish

C.

DES

D.

AES

Question 49

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?

Options:

A.

Avalanche

B.

Confusion

C.

Scrambling

D.

Diffusion

Question 50

A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.

Options:

A.

Total Break

B.

Distinguishing Algorithm

C.

Instance Deduction

D.

Information Deduction

Question 51

Which one of the following is an authentication method that sends the username and password in cleartext?

Options:

A.

PAP

B.

CHAP

C.

Kerberos

D.

SPAP

Question 52

With Cipher feedback (CFB) what happens?

Options:

A.

The key is reapplied

B.

The ciphertext block is encrypted then the ciphertext produced is XOR’d back with the plaintext to produce the current ciphertext block

C.

The block cipher is turned into a stream cipher

D.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

Question 53

John is trying to explain the basics of cryptography to a group of young, novice, security students. Which one of the following most accurately defines encryption?

Options:

A.

Changing a message using complex mathematics

B.

Applying keys to a message to conceal it

C.

Complex mathematics to conceal a message

D.

Changing a message so it can only be easily read by the intended recipient

Question 54

John works as a cryptography consultant. He finds that people often misunderstand the reality of breaking a cipher. What is the definition of breaking a cipher?

Options:

A.

Finding any method that is more efficient than brute force

B.

Uncovering the algorithm used

C.

Rendering the cypher no longer useable

D.

Decoding the key

Question 55

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?

Options:

A.

Me mod n

B.

Ce mod n

C.

y2 = x3 + Ax + B

D.

P = Cd mod n

Question 56

_____ uses at least two different shifts, changing the shift with different letters in the plain text.

Options:

A.

Caesar cipher

B.

multi-alphabet encryption

C.

Scytale

D.

Atbash

Question 57

How did the ATBASH cipher work?

Options:

A.

By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.)

B.

By rotating text a given number of spaces

C.

By Multi alphabet substitution

D.

By shifting each letter a certain number of spaces

Question 58

Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?

Options:

A.

Differential Analysis

B.

Discrete Cosine Transform

C.

Raw Quick Pair

D.

Chi squared analysis

Question 59

3DES can best be classified as which one of the following?

Options:

A.

Digital signature

B.

Symmetric algorithm

C.

Asymmetric algorithm

D.

Hashing algorithm

Question 60

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

Options:

A.

Skipjack

B.

Blowfish

C.

MD5

D.

Serpent

Question 61

You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as

Options:

A.

Odd numbers with no divisors

B.

Odd numbers

C.

Any number only divisible by odd numbers

D.

Any number only divisible by one and itself

Page: 1 / 21
Total 206 questions