Pass the ECCouncil ECES 212-81 Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Options:

A.

Wired Equivalent Privacy (WEP)


B.

Wi-Fi Protected Access 2 (WPA2)


C.

Wi-Fi Protected Access (WPA)


D.

Temporal Key Integrity Protocol (TKIP)


Expert Solution
Questions # 12:

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Options:

A.

WEP


B.

WEP2


C.

WPA


D.

WPA2


Expert Solution
Questions # 13:

A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.

Options:

A.

ADFVGX Cipher


B.

ROT13 Cipher


C.

Book Ciphers


D.

Cipher Disk


Expert Solution
Questions # 14:

A real time protocol for verifying certificates (and a newer method than CRL).

Options:

A.

Online Certificate Status Protocol (OCSP)


B.

Server-based Certificate Validation Protocol (SCVP)


C.

Public Key Infrastructure (PKI)


D.

Registration Authority (RA)


Expert Solution
Questions # 15:

A linear congruential generator is an example of what?

Options:

A.

A coprime generator


B.

A prime number generator


C.

A pseudo random number generator


D.

A random number generator


Expert Solution
Questions # 16:

What size block does AES work on?

Options:

A.

64


B.

128


C.

192


D.

256


Expert Solution
Questions # 17:

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

Options:

A.

SHA1


B.

SHA-256


C.

RSA


D.

MD5


Expert Solution
Questions # 18:

Which one of the following terms describes two numbers that have no common factors?

Options:

A.

Coprime


B.

Fermat's number


C.

Euler's totient


D.

Convergent


Expert Solution
Questions # 19:

Which of the following is the successor of SSL?

Options:

A.

GRE


B.

RSA


C.

IPSec


D.

TLS


Expert Solution
Questions # 20:

Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?

Options:

A.

K4


B.

K5


C.

K3


D.

K2


E.

K1


Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions