Certbus > EC-COUNCIL > ECES > 212-81 > 212-81 Online Practice Questions and Answers

212-81 Online Practice Questions and Answers

Questions 4

What does the OCSP protocol provide?

A. Revoked certificates

B. Hashing

C. VPN connectivity

D. Encryption

Browse 199 Q&As
Questions 5

You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?

A. CA

B. X.509

C. CRL

D. RFC 2298

Browse 199 Q&As
Questions 6

Which of the following is generally true about key sizes?

A. Larger key sizes increase security

B. Key size is irrelevant to security

C. Key sizes must be more than 256 bits to be secure

D. Smaller key sizes increase security

Browse 199 Q&As
Questions 7

A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used to try to discover patterns and use that information to decrypt the cipher.

A. Kasiski Method

B. Birthday Attack

C. Information Deduction

D. Integral Cryptanalysis

Browse 199 Q&As
Questions 8

Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.

A. Decoding

B. Substitution

C. Transposition

D. Collision

Browse 199 Q&As
Questions 9

During the process of encryption and decryption, what keys are shared?

A. Public keys

B. Public and private keys

C. User passwords

D. Private keys

Browse 199 Q&As
Questions 10

In a Feistel cipher, the two halves of the block are swapped in each round. What does this provide?

A. Diffusion

B. Confusion

C. Avalanche

D. Substitution

Browse 199 Q&As
Questions 11

Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.

A. Key

B. IV

C. Chain

D. Salt

Browse 199 Q&As
Questions 12

This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.

A. SHA-256

B. FORK-256

C. SHA-1

D. RSA

Browse 199 Q&As
Questions 13

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?

A. Vigenere's principle

B. Shamir's principle

C. Kerkchoff's principle

D. Babbage's principle

Browse 199 Q&As
Questions 14

Which of the following is a block cipher?

A. AES

B. DH

C. RC4

D. RSA

Browse 199 Q&As
Questions 15

An attack that is particularly successful against block ciphers based on substitution- permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.

A. Differential Cryptanalysis

B. Linear Cryptanalysis

C. Chosen Plaintext Attack

D. Integral Cryptanalysis

Browse 199 Q&As
Questions 16

A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?

A. SHA1

B. MD5

C. FORK

D. RIPEMD

Browse 199 Q&As
Questions 17

Which one of the following uses three different keys, all of the same size?

A. 3DES

B. AES

C. RSA

D. DES

Browse 199 Q&As
Questions 18

A disk you rotated to encrypt/decrypt. Created by Leon Alberti. Similar technologies were used in the Enigma machine. Considered the forefather of modern encryption.

A. Chi Square

B. Enigma Machine

C. Cipher Disks

D. Scytale Cipher

Browse 199 Q&As
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: May 02, 2024
Questions: 199 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99