March Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

212-81 Exam Dumps - EC-Council Certified Encryption Specialist (ECES)

Question # 4

With Electronic codebook (ECB) what happens:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

The block cipher is turned into a stream cipher

D.

The cipher text from the current round is XORed with the plaintext for the next round

Full Access
Question # 5

Which of the following is generally true about key sizes?

A.

Larger key sizes increase security

B.

Key size is irrelevant to security

C.

Key sizes must be more than 256 bits to be secure

D.

Smaller key sizes increase security

Full Access
Question # 6

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

A.

WEP

B.

WEP2

C.

WPA

D.

WPA2

Full Access
Question # 7

A _____ is a function is not reversible.

A.

Stream cipher

B.

Asymmetric cipher

C.

Hash

D.

Block Cipher

Full Access
Question # 8

A measure of the uncertainty associated with a random variable.

A.

Collision

B.

Whitening

C.

Diffusion

D.

Entropy

Full Access
Question # 9

A linear congruential generator is an example of what?

A.

A coprime generator

B.

A prime number generator

C.

A pseudo random number generator

D.

A random number generator

Full Access
Question # 10

Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W. Kravitz, and adopted by the U. S. government in 1993 with FIPS 186?

A.

DSA

B.

AES

C.

RC4

D.

RSA

Full Access
Question # 11

If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.

A.

15

B.

16

C.

3

D.

4

Full Access
Question # 12

Which of the following is required for a hash?

A.

Not vulnerable to a brute force attack

B.

Few collisions

C.

Must use SALT

D.

Not reversible

E.

Variable length input, fixed length output

F.

Minimum key length

Full Access
Question # 13

Storing private keys with a third party is referred to as what?

A.

Key caching

B.

Key storage

C.

Key banking

D.

Key escrow

Full Access
Question # 14

Which of the following is assured by the use of a hash?

A.

Confidentiality

B.

Availability

C.

Authentication

D.

Integrity

Full Access
Question # 15

Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.

A.

Decoding

B.

Substitution

C.

Transposition

D.

Collision

Full Access
Question # 16

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.

A.

Digital Signature

B.

Hash

C.

Ownership stamp

D.

Digest

Full Access
Question # 17

Which one of the following is an authentication method that sends the username and password in cleartext?

A.

PAP

B.

CHAP

C.

Kerberos

D.

SPAP

Full Access
Question # 18

Terrance oversees the key escrow server for his company. All employees use asymmetric cryptography to encrypt all emails. How many keys are needed for asymmetric cryptography?

A.

2

B.

4

C.

3

D.

1

Full Access
Question # 19

A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.

A.

TIGER

B.

GOST

C.

MD5

D.

MD6

Full Access
Question # 20

The Clipper chip is notable in the history of cryptography for many reasons. First, it was designed for civilian used secure phones. Secondly, it was designed to use a very specific symmetric cipher. Which one of the following was originally designed to provide built-in cryptography for the Clipper chip?

A.

Blowfish

B.

Twofish

C.

Skipjack

D.

Serpent

Full Access
Question # 21

Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.

A.

CLR

B.

OCSP

C.

TLS

D.

IPSec

Full Access
Question # 22

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

A.

SHA-0

B.

SHA-2

C.

SHA-1

D.

SHA-3

Full Access
Question # 23

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.

A.

PKI

B.

GOST

C.

CA

D.

PIKE

Full Access
Question # 24

Which one of the following are characteristics of a hash function? (Choose two)

A.

Requires a key

B.

One-way

C.

Fixed length output

D.

Symmetric

E.

Fast

Full Access
Question # 25

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?

A.

Avalanche

B.

Confusion

C.

Scrambling

D.

Diffusion

Full Access
Question # 26

____________cryptography uses one key to encrypt a message and a different key to decrypt it.

A.

Secure

B.

Asymmetric

C.

Stream

D.

Symmetric

Full Access
Question # 27

Which of the following is not a key size used by AES?

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 b

Full Access
Question # 28

Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?

A.

Caesar cipher

B.

RSA

C.

PGP

D.

DES

Full Access
Question # 29

Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.

A.

Key Schedule

B.

Key Clustering

C.

Key Space

D.

Key Exchange

Full Access