Pass the ECCouncil ECES 212-81 Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

With Electronic codebook (ECB) what happens:

Options:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption


B.

The cipher text from the current round is XORed with the plaintext from the previous round


C.

The block cipher is turned into a stream cipher


D.

The cipher text from the current round is XORed with the plaintext for the next round


Expert Solution
Questions # 52:

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

Options:

A.

Skipjack


B.

Blowfish


C.

MD5


D.

Serpent


Expert Solution
Questions # 53:

What is Kerchoff's principle?

Options:

A.

A minimum of 15 rounds is needed for a Feistel cipher to be secure


B.

Only the key needs to be secret, not the actual algorithm


C.

Both algorithm and key should be kept secret


D.

A minimum key size of 256 bits is necessary for security


Expert Solution
Questions # 54:

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?

Options:

A.

Vigenere's principle


B.

Shamir's principle


C.

Kerkchoff's principle


D.

Babbage's principle


Expert Solution
Questions # 55:

Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.

Options:

A.

Decoding


B.

Substitution


C.

Transposition


D.

Collision


Expert Solution
Questions # 56:

Which of the following statements is most true regarding binary operations and encryption?

Options:

A.

They can provide secure encryption


B.

They are only useful as a teaching method


C.

They can form a part of viable encryption methods


D.

They are completely useless


Expert Solution
Questions # 57:

This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.

Options:

A.

SHA-256


B.

FORK-256


C.

SHA-1


D.

RSA


Expert Solution
Questions # 58:

Which one of the following is a symmetric key system using 64-bit blocks?

Options:

A.

DES


B.

PGP


C.

DSA


D.

RSA


Expert Solution
Questions # 59:

Widely used, particularly with Microsoft operating systems. Created by MIT and derives its name from the mythical three headed dog. The is a great deal of verification for the tickets and the tickets expire quickly. Client authenticates to the Authentication Server once using a long term shared secret and receives back a Ticket-Granting Server. Client can reuse this ticket to get additional tickets without reusing the shared secret. These tickets are used to prove authentication to the Service Server.

Options:

A.

Diffie-Hellman


B.

Yarrow


C.

Kerberos


D.

ElGamal


Expert Solution
Questions # 60:

Which of the following would be the weakest encryption algorithm?

Options:

A.

DES


B.

AES


C.

RSA


D.

EC


Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions