ExamGecko
Home Home / ECCouncil / 212-81

ECCouncil 212-81 Practice Test - Questions Answers, Page 12

Question list
Search
Search

Related questions











Which of the following is the standard for digital certificates?

A.
RFC 2298
A.
RFC 2298
Answers
B.
X.509
B.
X.509
Answers
C.
CRL
C.
CRL
Answers
D.
CA
D.
CA
Answers
Suggested answer: B

Explanation:

X 509 https://en.wikipedia.org/wiki/X.509

X 509 is a standard defining the format of public key certificates. X.509 certificates are used in many Internet protocols, including TLS/SSL, which is the basis for HTTPS, the secure protocol for browsing the web. They are also used in offline applications, like electronic signatures. An X.509 certificate contains a public key and an identity (a hostname, or an organization, or an individual), and is either signed by a certificate authority or self-signed. When a certificate is signed by a trusted certificate authority, or validated by other means, someone holding that certificate can rely on the public key it contains to establish secure communications with another party, or validate documents digitally signed by the corresponding private key.


Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?

A.
160
A.
160
Answers
B.
512
B.
512
Answers
C.
256
C.
256
Answers
D.
128
D.
128
Answers
Suggested answer: D

Explanation:

128

https://en.wikipedia.org/wiki/MD5

The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value.

Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and C

A.
Receives request, authenticates it and forwards it to the CA.
A.
Receives request, authenticates it and forwards it to the CA.
Answers
B.
PKI (Public Key Infrastructure)
B.
PKI (Public Key Infrastructure)
Answers
C.
TTP (Trusted Third Party)
C.
TTP (Trusted Third Party)
Answers
D.
RA (Registration Authority)
D.
RA (Registration Authority)
Answers
E.
CP (Certificate Policy)
E.
CP (Certificate Policy)
Answers
Suggested answer: C

Explanation:

RA (Registration Authority)

https://en.wikipedia.org/wiki/Registration_authority

Registration authorities exist for many standards organizations, such as ANNA (Association of National Numbering Agencies for ISIN), the Object Management Group, W3C, IEEE and others. In general, registration authorities all perform a similar function, in promoting the use of a particular standard through facilitating its use. This may be by applying the standard, where appropriate, or by verifying that a particular application satisfies the standard's tenants. Maintenance agencies, in contrast, may change an element in a standard based on set rules -- such as the creation or change of a currency code when a currency is created or revalued (i.e. TRL to TRY for Turkish lira). The Object Management Group has an additional concept of certified provider, which is deemed an entity permitted to perform some functions on behalf of the registration authority, under specific processes and procedures documented within the standard for such a role.

Incorrect answers:

TTP (Trusted Third Party) - is an entity which facilitates interactions between two parties who both trust the third party; the Third Party reviews all critical transaction communications between the parties, based on the ease of creating fraudulent digital content. In TTP models, the relying parties use this trust to secure their own interactions. TTPs are common in any number of commercial transactions and in cryptographic digital transactions as well as cryptographic protocols, for example, a certificate authority (CA) would issue a digital identity certificate to one of the two parties in the next example. The CA then becomes the Trusted-Third-Party to that certificates issuance. Likewise transactions that need a third party recordation would also need a third-party repository service of some kind or another.

CP (Certificate Policy) - is a document which aims to state what are the different entities of a public key infrastructure (PKI), their roles and their duties. This document is published in the PKI perimeter.

When in use with X.509 certificates, a specific field can be set to include a link to the associated certificate policy. Thus, during an exchange, any relying party has an access to the assurance level associated with the certificate, and can decide on the level of trust to put in the certificate.

PKI (Public Key Infrastructure) - is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.

The time and effort required to break a security measure.

A.
Session Key
A.
Session Key
Answers
B.
Work factor
B.
Work factor
Answers
C.
Non-repudiation
C.
Non-repudiation
Answers
D.
Payload
D.
Payload
Answers
Suggested answer: B

Explanation:

Work factor

Work factor - the time and effort required to break a security measure.

Incorrect answers:

Non-repudiation - involves associating actions or changes with a unique individual.

Session Key - is a single-use symmetric key used for encrypting all messages in one communication session. A closely related term is content encryption key (CEK), traffic encryption key (TEK), or multicast key which refers to any key used for encrypting messages, contrary to other uses like encrypting other keys (key encryption key (KEK) or key wrapping key).

Payload - is the part of transmitted data that is the actual intended message. Headers and metadata are sent only to enable payload delivery.

Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?

A.
K4
A.
K4
Answers
B.
K5
B.
K5
Answers
C.
K3
C.
K3
Answers
D.
K2
D.
K2
Answers
E.
K1
E.
K1
Answers
Suggested answer: A, C

Explanation:

K3 and K4

https://en.wikipedia.org/wiki/Pseudorandom_number_generator

The German Federal Office for Information Security (Bundesamt fr Sicherheit in der Informationstechnik, BSI) has established four criteria for quality of deterministic random number generators.They are summarized here:

K1 -- There should be a high probability that generated sequences of random numbers are different from each other.

K2 -- A sequence of numbers is indistinguishable from 'truly random' numbers according to specified statistical tests. The tests are the monobit test (equal numbers of ones and zeros in the sequence), poker test (a special instance of the chi-squared test), runs test (counts the frequency of runs of various lengths), longruns test (checks whether there exists any run of length 34 or greater in 20 000 bits of the sequence)---both from BSI and NIST, and the autocorrelation test. In essence, these requirements are a test of how well a bit sequence: has zeros and ones equally often; after a sequence of n zeros (or ones), the next bit a one (or zero) with probability one-half; and any selected subsequence contains no information about the next element(s) in the sequence.

K3 -- It should be impossible for an attacker (for all practical purposes) to calculate, or otherwise guess, from any given subsequence, any previous or future values in the sequence, nor any inner state of the generator.

K4 -- It should be impossible, for all practical purposes, for an attacker to calculate, or guess from an inner state of the generator, any previous numbers in the sequence or any previous inner generator states.

For cryptographic applications, only generators meeting the K3 or K4 standards are acceptable.

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.

A.
Rail Fence Cipher
A.
Rail Fence Cipher
Answers
B.
Null Cipher
B.
Null Cipher
Answers
C.
Vigenere Cipher
C.
Vigenere Cipher
Answers
D.
ROT-13
D.
ROT-13
Answers
Suggested answer: A

Explanation:

Rail Fence Cipher

https://en.wikipedia.org/wiki/Rail_fence_cipher

The rail fence cipher (also called a zigzag cipher) is a form of transposition cipher. It derives its name from the way in which it is encoded.

Incorrect answers:

Null cipher - also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material. Today it is regarded as a simple form of steganography, which can be used to hide ciphertext.

Vigenre cipher - is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword. It employs a form of polyalphabetic substitution.

ROT13 - ('rotate by 13 places', sometimes hyphenated ROT-13) is a simple letter substitution cipher that replaces a letter with the 13th letter after it, in the alphabet. ROT13 is a special case of the Caesar cipher which was developed in ancient Rome.

With Cipher feedback (CFB) what happens?

A.
The key is reapplied
A.
The key is reapplied
Answers
B.
The ciphertext block is encrypted then the ciphertext produced is XOR'd back with the plaintext to produce the current ciphertext block
B.
The ciphertext block is encrypted then the ciphertext produced is XOR'd back with the plaintext to produce the current ciphertext block
Answers
C.
The block cipher is turned into a stream cipher
C.
The block cipher is turned into a stream cipher
Answers
D.
The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption
D.
The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption
Answers
Suggested answer: B

Explanation:

The ciphertext block is encrypted then the ciphertext produced is XOR'd back with the plaintext to produce the current ciphertext block

https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher_feedback_(CFB)

The cipher feedback (CFB) mode, a close relative of CBC, makes a block cipher into a self-synchronizing stream cipher.

Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.

A.
CLR
A.
CLR
Answers
B.
OCSP
B.
OCSP
Answers
C.
TLS
C.
TLS
Answers
D.
IPSec
D.
IPSec
Answers
Suggested answer: D

Explanation:

IPSec

https://en.wikipedia.org/wiki/IPsec

Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).

Incorrect answers:

OCSP - Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate.

CRL - is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should no longer be trusted.

TLS - Transport Layer Security, and its now-deprecated predecessor, Secure Sockets Layer (SSL), are cryptographic protocols designed to provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, instant messaging, and voice over IP (VoIP). Websites can use TLS to secure all communications between their servers and web browsers.

What type of encryption uses different keys to encrypt and decrypt the message?

A.
Asymmetric
A.
Asymmetric
Answers
B.
Symmetric
B.
Symmetric
Answers
C.
Secure
C.
Secure
Answers
D.
Private key
D.
Private key
Answers
Suggested answer: A

Explanation:

Asymmetric

https://en.wikipedia.org/wiki/Public-key_cryptography

Asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security.

With Electronic codebook (ECB) what happens:

A.
The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption
A.
The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption
Answers
B.
The cipher text from the current round is XORed with the plaintext from the previous round
B.
The cipher text from the current round is XORed with the plaintext from the previous round
Answers
C.
The block cipher is turned into a stream cipher
C.
The block cipher is turned into a stream cipher
Answers
D.
The cipher text from the current round is XORed with the plaintext for the next round
D.
The cipher text from the current round is XORed with the plaintext for the next round
Answers
Suggested answer: A

Explanation:

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_(ECB)

The simplest of the encryption modes is the electronic codebook (ECB) mode (named after conventional physical codebooks). The message is divided into blocks, and each block is encrypted separately.

Total 206 questions
Go to page: of 21