ExamGecko
Home Home / ECCouncil / 212-81

ECCouncil 212-81 Practice Test - Questions Answers, Page 16

Question list
Search
Search

Related questions











What is the solution to the equation 8 mod 3?

A.
1
A.
1
Answers
B.
4
B.
4
Answers
C.
3
C.
3
Answers
D.
2
D.
2
Answers
Suggested answer: D

Explanation:

2

https://en.wikipedia.org/wiki/Modulo_operation

The modulo operation returns the remainder or signed remainder of a division, after one number is divided by another (called the modulus of the operation).

Given two positive numbers a and n, a modulo n (abbreviated as a mod n) is the remainder of the Euclidean division of a by n, where a is the dividend and n is the divisor. The modulo operation is to be distinguished from the symbol mod, which refers to the modulus (or divisor) one is operating from.

For example, the expression '5 mod 2' would evaluate to 1, because 5 divided by 2 has a quotient of 2 and a remainder of 1, while '9 mod 3' would evaluate to 0, because the division of 9 by 3 has a quotient of 3 and a remainder of 0; there is nothing to subtract from 9 after multiplying 3 times 3.

What must occur in order for a cipher to be considered 'broken'?

A.
Uncovering the algorithm used
A.
Uncovering the algorithm used
Answers
B.
Decoding the key
B.
Decoding the key
Answers
C.
Finding any method that is more efficient than brute force
C.
Finding any method that is more efficient than brute force
Answers
D.
Rendering the cipher no longer useable
D.
Rendering the cipher no longer useable
Answers
Suggested answer: C

Explanation:

Finding any method that is more efficient than brute force

https://en.wikipedia.org/wiki/Cryptanalysis

Bruce Schneier notes that even computationally impractical attacks can be considered breaks: 'Breaking a cipher simply means finding a weakness in the cipher that can be exploited with a complexity less than brute force.'

MD5 can best be described as which one of the following?

A.
Asymmetric algorithm
A.
Asymmetric algorithm
Answers
B.
Hashing algorithm
B.
Hashing algorithm
Answers
C.
Digital signature
C.
Digital signature
Answers
D.
Symmetric algorithm
D.
Symmetric algorithm
Answers
Suggested answer: B

Explanation:

Hashing algorithm

https://en.wikipedia.org/wiki/MD5

The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption. It remains suitable for other non-cryptographic purposes, for example for determining the partition for a particular key in a partitioned database.

What is a 'Collision attack' in cryptography?

A.
Collision attacks try to break the hash into three parts to get the plaintext value
A.
Collision attacks try to break the hash into three parts to get the plaintext value
Answers
B.
Collision attacks try to get the public key
B.
Collision attacks try to get the public key
Answers
C.
Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key
C.
Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key
Answers
D.
Collision attacks try to find two inputs producing the same
D.
Collision attacks try to find two inputs producing the same
Answers
Suggested answer: D

Explanation:

Collision attacks try to find two inputs producing the same

https://en.wikipedia.org/wiki/Collision_attack

A collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast to a preimage attack where a specific target hash value is specified.

If the round function is a cryptographically secure pseudorandom function, then ___________ rounds is sufficient to make the block cipher a pseudorandom permutation.

A.
2
A.
2
Answers
B.
15
B.
15
Answers
C.
16
C.
16
Answers
D.
3
D.
3
Answers
Suggested answer: D

Explanation:

3

https://en.wikipedia.org/wiki/Feistel_cipher

Michael Luby and Charles Rackoff analyzed the Feistel cipher construction, and proved that if the round function is a cryptographically secure pseudorandom function, with Ki used as the seed, then 3 rounds are sufficient to make the block cipher a pseudorandom permutation, while 4 rounds are sufficient to make it a 'strong' pseudorandom permutation (which means that it remains pseudorandom even to an adversary who gets oracle access to its inverse permutation). Because of this very important result of Luby and Rackoff, Feistel ciphers are sometimes called Luby--Rackoff block ciphers.

____________cryptography uses one key to encrypt a message and a different key to decrypt it.

A.
Secure
A.
Secure
Answers
B.
Asymmetric
B.
Asymmetric
Answers
C.
Stream
C.
Stream
Answers
D.
Symmetric
D.
Symmetric
Answers
Suggested answer: B

Explanation:

Asymmetric

https://en.wikipedia.org/wiki/Public-key_cryptography

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security.

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ________ integrity check mechanism provides security against a replay attack.

A.
CBC-MAC
A.
CBC-MAC
Answers
B.
CRC-MAC
B.
CRC-MAC
Answers
C.
CRC-32
C.
CRC-32
Answers
D.
CBC-32
D.
CBC-32
Answers
Suggested answer: A

Explanation:

CBC-MAC

https://en.wikipedia.org/wiki/CBC-MAC

A cipher block chaining message authentication code (CBC-MAC) is a technique for constructing a message authentication code from a block cipher. The message is encrypted with some block cipher algorithm in CBC mode to create a chain of blocks such that each block depends on the proper encryption of the previous block. This interdependence ensures that a change to any of the plaintext bits will cause the final encrypted block to change in a way that cannot be predicted or counteracted without knowing the key to the block cipher. Using in WPA2 for integrity check and provides security against a replay attack.

A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?

A.
SHA1
A.
SHA1
Answers
B.
MD5
B.
MD5
Answers
C.
FORK
C.
FORK
Answers
D.
RIPEMD
D.
RIPEMD
Answers
Suggested answer: D

Explanation:

RIPEMD

https://en.wikipedia.org/wiki/RIPEMD

RIPEMD (RIPE Message Digest) is a family of cryptographic hash functions developed in 1992 (the original RIPEMD) and 1996 (other variants). There are five functions in the family: RIPEMD, RIPEMD-128, RIPEMD-160, RIPEMD-256, and RIPEMD-320, of which RIPEMD-160 is the most common.

The original RIPEMD, as well as RIPEMD-128, is not considered secure because 128-bit result is too small and also (for the original RIPEMD) because of design weaknesses. The 256- and 320-bit versions of RIPEMD provide the same level of security as RIPEMD-128 and RIPEMD-160, respectively; they are designed for applications where the security level is sufficient but longer hash result is necessary.

How can rainbow tables be defeated?

A.
Lockout accounts under brute force password cracking attempts
A.
Lockout accounts under brute force password cracking attempts
Answers
B.
All uppercase character passwords
B.
All uppercase character passwords
Answers
C.
Use of non-dictionary words
C.
Use of non-dictionary words
Answers
D.
Password salting
D.
Password salting
Answers
Suggested answer: D

Explanation:

Password salting

https://en.wikipedia.org/wiki/Salt_(cryptography)#Benefits

Salts also combat the use of hash tables and rainbow tables for cracking passwords. A hash table is a large list of pre-computed hashes for commonly used passwords. For a password file without salts, an attacker can go through each entry and look up the hashed password in the hash table or rainbow table. If the look-up is considerably faster than the hash function (which it often is), this will considerably speed up cracking the file. However, if the password file is salted, then the hash table or rainbow table would have to contain 'salt . password' pre-hashed. If the salt is long enough and sufficiently random, this is very unlikely. Unsalted passwords chosen by humans tend to be vulnerable to dictionary attacks since they have to be both short and meaningful enough to be memorized. Even a small dictionary (or its hashed equivalent, a hash table) is significant help cracking the most commonly used passwords. Since salts do not have to be memorized by humans they can make the size of the rainbow table required for a successful attack prohibitively large without placing a burden on the users.

Which one of the following is a component of the PKI?

A.
CA
A.
CA
Answers
B.
TGS
B.
TGS
Answers
C.
OCSP
C.
OCSP
Answers
D.
TGT
D.
TGT
Answers
Suggested answer: A

Explanation:

CA

https://en.wikipedia.org/wiki/Certificate_authority

Certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party---trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. The format of these certificates is specified by the X.509 or EMV standard.

Total 206 questions
Go to page: of 21