ExamGecko
Home Home / ECCouncil / 212-81

ECCouncil 212-81 Practice Test - Questions Answers, Page 17

Question list
Search
Search

Related questions











Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.

A.
Linear cryptanalysis
A.
Linear cryptanalysis
Answers
B.
Replay attack
B.
Replay attack
Answers
C.
Side-channel attack
C.
Side-channel attack
Answers
D.
Social engineering attack
D.
Social engineering attack
Answers
Suggested answer: D

Explanation:

Social engineering attack

https://en.wikipedia.org/wiki/Social_engineering_(security)

Social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional 'con' in that it is often one of many steps in a more complex fraud scheme.

Incorrect answers:

Replay attack -(also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a masquerade attack by IP packet substitution. This is one of the lower tier versions of a 'Man-in-the-middle attack.'

Side-channel attack -is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs). Timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information, which can be exploited.

Linear cryptanalysis -is a general form of cryptanalysis based on finding affine approximations to the action of a cipher. Attacks have been developed for block ciphers and stream ciphers. Linear cryptanalysis is one of the two most widely used attacks on block ciphers; the other being differential cryptanalysis.

Which of the following is used to encrypt email and create digital signatures?

A.
DES
A.
DES
Answers
B.
SHA1
B.
SHA1
Answers
C.
AES
C.
AES
Answers
D.
RSA
D.
RSA
Answers
Suggested answer: D

Explanation:

RSA

https://en.wikipedia.org/wiki/RSA_(cryptosystem)

RSA usefor encryption email and create digital signatures

Which service in a PKI will vouch for the identity of an individual or company?

A.
CA
A.
CA
Answers
B.
CR
B.
CR
Answers
C.
KDC
C.
KDC
Answers
D.
CBC
D.
CBC
Answers
Suggested answer: A

Explanation:

CA

https://en.wikipedia.org/wiki/Certificate_authority

A certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party---trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. The format of these certificates is specified by the X.509 or EMV standard.

Which one of the following attempts to hide data in plain view?

A.
Cryptography
A.
Cryptography
Answers
B.
Substitution
B.
Substitution
Answers
C.
Steganography
C.
Steganography
Answers
D.
Asymmetric cryptography
D.
Asymmetric cryptography
Answers
Suggested answer: C

Explanation:

Steganography

https://en.wikipedia.org/wiki/Steganography

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words stegans , meaning 'covered or concealed', and -graphia meaning 'writing'.

Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.

A.
Cipher disk
A.
Cipher disk
Answers
B.
Caesar cipher
B.
Caesar cipher
Answers
C.
Scytale
C.
Scytale
Answers
D.
Enigma machine
D.
Enigma machine
Answers
Suggested answer: C

Explanation:

Scytale

https://en.wikipedia.org/wiki/Scytale

A scytale is a tool used to perform a transposition cipher, consisting of a cylinder with a strip of parchment wound around it on which is written a message. The ancient Greeks, and the Spartans in particular, are said to have used this cipher in 7th century BC to communicate during military campaigns.

The recipient uses a rod of the same diameter on which the parchment is wrapped to read the message. It has the advantage of being fast and not prone to mistakes---a necessary property when on the battlefield. It can, however, be easily broken. Since the strip of parchment hints strongly at the method, the ciphertext would have to be transferred to something less suggestive, somewhat reducing the advantage noted.

Incorrect answers:

Cipher disk -is an enciphering and deciphering tool developed in 1470 by the Italian architect and author Leon Battista Alberti. He constructed a device, (eponymously called the Alberti cipher disk) consisting of two concentric circular plates mounted one on top of the other. The larger plate is called the 'stationary' and the smaller one the 'moveable' since the smaller one could move on top of the 'stationary'.

Enigma machine -is an encryption device developed and used in the early- to mid-20th century to protect commercial, diplomatic and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military.

Caesar cipher -(also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift) is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

A.
SHA1
A.
SHA1
Answers
B.
SHA-256
B.
SHA-256
Answers
C.
RSA
C.
RSA
Answers
D.
MD5
D.
MD5
Answers
Suggested answer: D

Explanation:

MD5

https://en.wikipedia.org/wiki/MD5

The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption. It remains suitable for other non-cryptographic purposes, for example for determining the partition for a particular key in a partitioned database.

MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as RFC 1321.

Incorrect answers:

SHA1 -(Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest -- typically rendered as a hexadecimal number, 40 digits long. It was designed by the United States National Security Agency, and is a U.S. Federal Information Processing Standard.

RSA-(Rivest--Shamir--Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977. An equivalent system was developed secretly, in 1973 at GCHQ (the British signals intelligence agency), by the English mathematician Clifford Cocks. That system was declassified in 1997.

SHA-256 -SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle--Damgrd structure, from a one-way compression function itself built using the Davies--Meyer structure from a specialized block cipher. SHA-2 includes significant changes from its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256

Which of the following is an asymmetric algorithm that was first publically described in 1977?

A.
Elliptic Curve
A.
Elliptic Curve
Answers
B.
Twofish
B.
Twofish
Answers
C.
DESX
C.
DESX
Answers
D.
RSA
D.
RSA
Answers
Suggested answer: D

Explanation:

RSA

https://en.wikipedia.org/wiki/RSA_(cryptosystem)

RSA (Rivest--Shamir--Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977.

Incorrect answers:

Elliptic Curve -Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide equivalent security.

Twofish -is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Twofish is related to the earlier block cipher Blowfish.

DESX -is a variant on the DES (Data Encryption Standard) symmetric-key block cipher intended to increase the complexity of a brute-force attack using a technique called key whitening.

Bob's password is hashed, and so is John's. Even though they used different passwords, the hash is the same. What is this called?

A.
A collision
A.
A collision
Answers
B.
A mistake
B.
A mistake
Answers
C.
Convergence
C.
Convergence
Answers
D.
Transposition
D.
Transposition
Answers
Suggested answer: A

Explanation:

A collision

https://en.wikipedia.org/wiki/Collision_(computer_science)

A collision or clash is a situation that occurs when two distinct pieces of data have the same hash value, checksum, fingerprint, or cryptographic digest.

What does the OCSP protocol provide?

A.
Revoked certificates
A.
Revoked certificates
Answers
B.
Hashing
B.
Hashing
Answers
C.
VPN connectivity
C.
VPN connectivity
Answers
D.
Encryption
D.
Encryption
Answers
Suggested answer: A

Explanation:

Revoked certificates

https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol

The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate.It is described in RFC 6960 and is on the Internet standards track. It was created as an alternative to certificate revocation lists (CRL), specifically addressing certain problems associated with using CRLs in a public key infrastructure (PKI). Messages communicated via OCSP are encoded in ASN.1 and are usually communicated over HTTP. The 'request/response' nature of these messages leads to OCSP servers being termed OCSP responders.

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

A.
Wired Equivalent Privacy (WEP)
A.
Wired Equivalent Privacy (WEP)
Answers
B.
Wi-Fi Protected Access 2 (WPA2)
B.
Wi-Fi Protected Access 2 (WPA2)
Answers
C.
Wi-Fi Protected Access (WPA)
C.
Wi-Fi Protected Access (WPA)
Answers
D.
Temporal Key Integrity Protocol (TKIP)
D.
Temporal Key Integrity Protocol (TKIP)
Answers
Suggested answer: A

Explanation:

Wired Equivalent Privacy (WEP)

https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy#Weak_security

In 2007, Erik Tews, Andrei Pychkine, and Ralf-Philipp Weinmann were able to extend Klein's 2005 attack and optimize it for usage against WEP. With the new attack it is possible to recover a 104-bit WEP key with probability 50% using only 40,000 captured packets. For 60,000 available data packets, the success probability is about 80% and for 85,000 data packets about 95%. Using active techniques like deauth and ARP re-injection, 40,000 packets can be captured in less than one minute under good conditions. The actual computation takes about 3 seconds and 3 MB of main memory on a Pentium-M 1.7 GHz and can additionally be optimized for devices with slower CPUs. The same attack can be used for 40-bit keys with an even higher success probability.

Total 206 questions
Go to page: of 21