Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 212-81 - EC-Council Certified Encryption Specialist (ECES)

Page: 4 / 7
Total 206 questions

Widely used, particularly with Microsoft operating systems. Created by MIT and derives its name from the mythical three headed dog. The is a great deal of verification for the tickets and the tickets expire quickly. Client authenticates to the Authentication Server once using a long term shared secret and receives back a Ticket-Granting Server. Client can reuse this ticket to get additional tickets without reusing the shared secret. These tickets are used to prove authentication to the Service Server.

A.

Diffie-Hellman

B.

Yarrow

C.

Kerberos

D.

ElGamal

In 1977 researchers and MIT described what asymmetric algorithm?

A.

DH

B.

RSA

C.

AES

D.

EC

Which one of the following is a component of the PKI?

A.

CA

B.

TGS

C.

OCSP

D.

TGT

A disk you rotated to encrypt/decrypt. Created by Leon Alberti. Similar technologies were used in the Enigma machine. Considered the forefather of modern encryption.

A.

Chi Square

B.

Enigma Machine

C.

Cipher Disks

D.

Scytale Cipher

John works as a cryptography consultant. He finds that people often misunderstand the reality of breaking a cipher. What is the definition of breaking a cipher?

A.

Finding any method that is more efficient than brute force

B.

Uncovering the algorithm used

C.

Rendering the cypher no longer useable

D.

Decoding the key

A number that is used only one time, then discarded is called what?

A.

IV

B.

Nonce

C.

Chain

D.

Salt

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?

A.

Complete diffusion

B.

Complete scrambling

C.

Complete confusion

D.

Complete avalanche

You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?

A.

CA

B.

X.509

C.

CRL

D.

RFC 2298

Message hidden in unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind.

A.

Caesar Cipher

B.

Null Ciphers

C.

Vigenere Cipher

D.

Playfair Cipher

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

A.

PKI

B.

DES

C.

RSA

D.

Diffie-Helmann