Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 212-81 - EC-Council Certified Encryption Specialist (ECES)

Page: 5 / 7
Total 206 questions

Which of the following is assured by the use of a hash?

A.

Confidentiality

B.

Availability

C.

Authentication

D.

Integrity

John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)

A.

Encrypt mode

B.

Transport mode

C.

Tunnel mode

D.

Decrypt mode

Frank is trying to break into an encrypted file… He is attempting all the possible keys that could be used for this algorithm. Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?

A.

Rainbow table

B.

Frequency analysis

C.

Brute force

D.

Kasiski

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

A.

IPsec Policy Agent

B.

Internet Key Exchange (IKE)

C.

Oakley

D.

IPsec driver

In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed

A.

Vector

B.

Salt

C.

Stream

D.

IV

What is Kerchoff's principle?

A.

A minimum of 15 rounds is needed for a Feistel cipher to be secure

B.

Only the key needs to be secret, not the actual algorithm

C.

Both algorithm and key should be kept secret

D.

A minimum key size of 256 bits is necessary for security

Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186

A.

AES

B.

RC4

C.

DSA

D.

RSA

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

A.

Skipjack

B.

Blowfish

C.

MD5

D.

Serpent

Which of the following is not a key size used by AES?

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 b

Electromechanical rotor-based cipher used in World War II

A.

ROT13 Cipher

B.

Cipher Disk

C.

Enigma Machine

D.

Rail Fence Cipher