Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

ECCouncil 212-81 EC-Council Certified Encryption Specialist (ECES) Exam Practice Test

Page: 1 / 20
Total 199 questions

EC-Council Certified Encryption Specialist (ECES) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$40.25  $114.99

PDF Study Guide

  • Product Type: PDF Study Guide
$35  $99.99
Question 1

Original, unencrypted information is referred to as ____.

Options:

A.

text

B.

plaintext

C.

ciphertext

D.

cleartext

Question 2

During the process of encryption and decryption, what keys are shared?

Options:

A.

Public keys

B.

Public and private keys

C.

User passwords

D.

Private keys

Question 3

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

Options:

A.

SHA1

B.

SHA-256

C.

RSA

D.

MD5

Question 4

RFC 1321 describes what hash?

Options:

A.

RIPEMD

B.

GOST

C.

SHA1

D.

MD5

Question 5

In 1977 researchers and MIT described what asymmetric algorithm?

Options:

A.

DH

B.

RSA

C.

AES

D.

EC

Question 6

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

Options:

A.

SHA-0

B.

SHA-2

C.

SHA-1

D.

SHA-3

Question 7

Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?

Options:

A.

Pegasus

B.

Blowfish

C.

SHA1

D.

AES

Question 8

Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.

Options:

A.

Tiger

B.

GOST

C.

RIPEMD

D.

ElGamal

Question 9

John works as a cryptography consultant. He finds that people often misunderstand the reality of breaking a cipher. What is the definition of breaking a cipher?

Options:

A.

Finding any method that is more efficient than brute force

B.

Uncovering the algorithm used

C.

Rendering the cypher no longer useable

D.

Decoding the key

Question 10

Which one of the following is an authentication method that sends the username and password in cleartext?

Options:

A.

PAP

B.

CHAP

C.

Kerberos

D.

SPAP

Question 11

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

Options:

A.

Key distribution

B.

Security

C.

Scalability

D.

Speed

Question 12

What does the OCSP protocol provide?

Options:

A.

Revoked certificates

B.

Hashing

C.

VPN connectivity

D.

Encryption

Question 13

A number that is used only one time, then discarded is called what?

Options:

A.

IV

B.

Nonce

C.

Chain

D.

Salt

Question 14

A _____ is a function is not reversible.

Options:

A.

Stream cipher

B.

Asymmetric cipher

C.

Hash

D.

Block Cipher

Question 15

The Clipper chip is notable in the history of cryptography for many reasons. First, it was designed for civilian used secure phones. Secondly, it was designed to use a very specific symmetric cipher. Which one of the following was originally designed to provide built-in cryptography for the Clipper chip?

Options:

A.

Blowfish

B.

Twofish

C.

Skipjack

D.

Serpent

Question 16

Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.

Options:

A.

Certificate Authority

B.

Raw Quick Pair

C.

Chi-Square Analysis

D.

SP network

Question 17

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.

Options:

A.

Rail Fence Cipher

B.

Null Cipher

C.

Vigenere Cipher

D.

ROT-13

Question 18

Which method of password cracking takes the most time and effort?

Options:

A.

Dictionary attack

B.

Shoulder surfing

C.

Brute force

D.

Rainbow tables

Question 19

Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.

Options:

A.

TIGER

B.

GOST

C.

BEAR

D.

FORK-256

Question 20

Which of the following is the standard for digital certificates?

Options:

A.

RFC 2298

B.

X.509

C.

CRL

D.

CA

Question 21

A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used to try to discover patterns and use that information to decrypt the cipher.

Options:

A.

Kasiski Method

B.

Birthday Attack

C.

Information Deduction

D.

Integral Cryptanalysis

Question 22

The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.

Options:

A.

ElGamal

B.

RSA

C.

PAP

D.

X.509

Question 23

The concept that if one bit of data changes, the cipher text will all completely change as well.

Options:

A.

Avalanche

B.

Substitution

C.

Confusion

D.

Collision

Question 24

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

Options:

A.

PKI

B.

DES

C.

RSA

D.

Diffie-Helmann

Question 25

Which of the following is used to encrypt email and create digital signatures?

Options:

A.

DES

B.

SHA1

C.

AES

D.

RSA

Question 26

An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.

Options:

A.

Differential Cryptanalysis

B.

Linear Cryptanalysis

C.

Chosen Plaintext Attack

D.

Integral Cryptanalysis

Question 27

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.

Options:

A.

Digital Signature

B.

Hash

C.

Ownership stamp

D.

Digest

Question 28

What is a salt?

Options:

A.

Key whitening

B.

Random bits intermixed with a symmetric cipher to increase randomness and make it more secure

C.

Key rotation

D.

Random bits intermixed with a hash to increase randomness and reduce collisions

Question 29

Which of the following is the successor of SSL?

Options:

A.

GRE

B.

RSA

C.

IPSec

D.

TLS

Page: 1 / 20
Total 199 questions