Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 212-81 - EC-Council Certified Encryption Specialist (ECES)

Page: 3 / 7
Total 206 questions

What does the OCSP protocol provide?

A.

Revoked certificates

B.

Hashing

C.

VPN connectivity

D.

Encryption

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

A.

WEP

B.

WEP2

C.

WPA

D.

WPA2

What best describes the shifting of each letter a fixed number of spaces to the left or right?

A.

Single substitution

B.

Multi substitution

C.

XOR

D.

Bit shifting

John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?

A.

Kerberos

B.

EAP

C.

Radius

D.

CHAP

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.

A.

PKI

B.

GOST

C.

CA

D.

PIKE

MD5 can best be described as which one of the following?

A.

Asymmetric algorithm

B.

Hashing algorithm

C.

Digital signature

D.

Symmetric algorithm

3DES can best be classified as which one of the following?

A.

Digital signature

B.

Symmetric algorithm

C.

Asymmetric algorithm

D.

Hashing algorithm

Which one of the following is a symmetric key system using 64-bit blocks?

A.

DES

B.

PGP

C.

DSA

D.

RSA

When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.

A.

Mersenne's number

B.

Fermat's number

C.

Euler's totient

D.

Fermat's prime

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

A.

Key distribution

B.

Security

C.

Scalability

D.

Speed