Pass the ECCouncil ECES 212-81 Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following is a protocol for exchanging keys?

Options:

A.

DH


B.

EC


C.

AES


D.

RSA


Expert Solution
Questions # 2:

John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?

Options:

A.

Kerberos


B.

EAP


C.

Radius


D.

CHAP


Expert Solution
Questions # 3:

What is the solution to the equation 8 mod 3?

Options:

A.

1


B.

4


C.

3


D.

2


Expert Solution
Questions # 4:

What does Output feedback (OFB) do:

Options:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption


B.

The cipher text from the current round is XORed with the plaintext from the previous round


C.

A block cipher is converted into a stream cipher by generating a keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext


D.

The cipher text from the current round is XORed with the plaintext for the next round


Expert Solution
Questions # 5:

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.

Options:

A.

Rail Fence Cipher


B.

Null Cipher


C.

Vigenere Cipher


D.

ROT-13


Expert Solution
Questions # 6:

If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?

Options:

A.

Alice's private key


B.

Bob's private key


C.

Alice's public key


D.

Bob's public key


Expert Solution
Questions # 7:

Why is quantum computing a threat to RSA?

Options:

A.

The processing speed will brute force algorithms


B.

Quantum computers can solve the discrete logarithm problem


C.

Quantum computers can solve the birthday paradox


D.

Quantum computers can factor large integers in polynomial time


Expert Solution
Questions # 8:

Electromechanical rotor-based cipher used in World War II

Options:

A.

ROT13 Cipher


B.

Cipher Disk


C.

Enigma Machine


D.

Rail Fence Cipher


Expert Solution
Questions # 9:

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

Options:

A.

Key Schedule


B.

Feistel Network


C.

SHA-2


D.

Diffie-Helman


Expert Solution
Questions # 10:

Storing private keys with a third party is referred to as what?

Options:

A.

Key caching


B.

Key storage


C.

Key banking


D.

Key escrow


Expert Solution
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions