ECCouncil 212-81 - EC-Council Certified Encryption Specialist (ECES)
Which of the following is assured by the use of a hash?
John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)
Frank is trying to break into an encrypted file… He is attempting all the possible keys that could be used for this algorithm. Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed
What is Kerchoff's principle?
Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186
A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.
Which of the following is not a key size used by AES?
Electromechanical rotor-based cipher used in World War II