Eccouncil 212-81 Certified Encryption Specialist ECES Exam Practice Test

Page: 1 / 14
Total 206 questions
Question 1

Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?



Answer : D


Question 2

A part of understanding symmetric cryptography understands the modes in which it can be used. You are

explaining those modes to a group of cryptography students. The most basic encryption mode is____________.

The message is divided into blocks, and each block is encrypted separately with no modification to the process.



Answer : D


Question 3

John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?



Answer : A


Question 4

How does Kerberos generate the first secret key in the authentication process?



Answer : B


Question 5

Which one of the following attempts to hide data in plain view?



Answer : C

Steganography

https://en.wikipedia.org/wiki/Steganography

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words stegans , meaning 'covered or concealed', and -graphia meaning 'writing'.


Question 6

Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W. Kravitz, and adopted by the U. S. government in 1993 with FIPS 186?



Answer : A

DSA

https://en.wikipedia.org/wiki/Digital_Signature_Algorithm

DSA is covered by U.S. Patent 5,231,668 , filed July 26, 1991 and now expired, and attributed to David W. Kravitz, a former NSA employee. This patent was given to 'The United States of America as represented by the Secretary of Commerce, Washington, D.C.', and NIST has made this patent available worldwide royalty-free. Claus P. Schnorr claims that his U.S. Patent 4,995,082 (also now expired) covered DSA; this claim is disputed.


Question 7

Which of the following techniques is used (other than brute force) to attempt to derive a key?



Answer : B

Cryptoanalysis

https://en.wikipedia.org/wiki/Cryptanalysis

Cryptanalysis is the study of analyzing information systems in order to study the hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.


Page:    1 / 14   
Total 206 questions