Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 212-81 - EC-Council Certified Encryption Specialist (ECES)

Page: 6 / 7
Total 206 questions

An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.

A.

CHAP

B.

SPAP

C.

PAP

D.

EAP

Storing private keys with a third party is referred to as what?

A.

Key caching

B.

Key storage

C.

Key banking

D.

Key escrow

Which service in a PKI will vouch for the identity of an individual or company?

A.

CA

B.

CR

C.

KDC

D.

CBC

The reverse process from encoding - converting the encoded message back into its plaintext format.

A.

Substitution

B.

Whitening

C.

Encoding

D.

Decoding

Bob’s password is hashed, and so is John’s. Even though they used different passwords, the hash is the same. What is this called?

A.

A collision

B.

A mistake

C.

Convergence

D.

Transposition

Which one of the following attempts to hide data in plain view?

A.

Cryptography

B.

Substitution

C.

Steganography

D.

Asymmetric cryptography

A linear congruential generator is an example of what?

A.

A coprime generator

B.

A prime number generator

C.

A pseudo random number generator

D.

A random number generator

The ATBASH cipher is best described as what type of cipher?

A.

Asymmetric

B.

Symmetric

C.

Substitution

D.

Transposition

Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.

A.

Cipher disk

B.

Caesar cipher

C.

Scytale

D.

Enigma machine

A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed

A.

Туре 1

B.

Туре 4

C.

Туре 2

D.

Туре 3