ExamGecko
Home Home / ECCouncil / 212-81

ECCouncil 212-81 Practice Test - Questions Answers, Page 19

Question list
Search
Search

Related questions











Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

A.
WEP2
A.
WEP2
Answers
B.
WPA
B.
WPA
Answers
C.
WEP
C.
WEP
Answers
D.
WPA2
D.
WPA2
Answers
Suggested answer: D

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?


A.
Me mod n
A.
Me mod n
Answers
B.
Ce mod n
B.
Ce mod n
Answers
C.
y2 = x3 + Ax + B
C.
y2 = x3 + Ax + B
Answers
D.
P = Cd mod n
D.
P = Cd mod n
Answers
Suggested answer: B

Why is quantum computing a threat to RSA?

A.
The processing speed will brute force algorithms
A.
The processing speed will brute force algorithms
Answers
B.
Quantum computers can solve the discrete logarithm problem
B.
Quantum computers can solve the discrete logarithm problem
Answers
C.
Quantum computers can solve the birthday paradox
C.
Quantum computers can solve the birthday paradox
Answers
D.
Quantum computers can factor large integers in polynomial time
D.
Quantum computers can factor large integers in polynomial time
Answers
Suggested answer: D

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.

A.
PKI
A.
PKI
Answers
B.
GOST
B.
GOST
Answers
C.
CA
C.
CA
Answers
D.
PIKE
D.
PIKE
Answers
Suggested answer: A

Explanation:

PKI

https://en.wikipedia.org/wiki/Public_key_infrastructure

A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.

Incorrect answers:

PIKE -stream cipher was invented by Ross Anderson to be a 'leaner and meaner' version of FISH after he broke FISH in 1994. Its name is supposed to be a humorous allusion to the pike fish.

GOST-hash function, defined in the standards GOST R 34.11-94 and GOST 34.311-95 is a 256-bit cryptographic hash function. It was initially defined in the Russian national standard GOST R 34.11-94 Information Technology -- Cryptographic Information Security -- Hash Function. The equivalent standard used by other member-states of the CIS is GOST 34.311-95.

CA -certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party---trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. The format of these certificates is specified by the X.509 or EMV standard.

Which of the following is an asymmetric algorithm related to the equation y^2 = x^3 + Ax + B?

A.
Blowfish
A.
Blowfish
Answers
B.
Elliptic Curve
B.
Elliptic Curve
Answers
C.
AES
C.
AES
Answers
D.
RSA
D.
RSA
Answers
Suggested answer: B

Explanation:

Elliptic Curve

https://en.wikipedia.org/wiki/Elliptic-curve_cryptography

For current cryptographic purposes, an elliptic curve is a plane curve over a finite field (rather than the real numbers) which consists of the points satisfying the equation:

Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?

A.
PIKE
A.
PIKE
Answers
B.
Twofish
B.
Twofish
Answers
C.
RC4
C.
RC4
Answers
D.
Blowfish
D.
Blowfish
Answers
Suggested answer: C

Explanation:

RC4

https://en.wikipedia.org/wiki/RC4

RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher. While it is remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure. It is especially vulnerable when the beginning of the output keystream is not discarded, or when nonrandom or related keys are used. Particularly problematic uses of RC4 have led to very insecure protocols such as WEP.

The key-scheduling algorithm is used to initialize the permutation in the array 'S'. 'keylength' is defined as the number of bytes in the key and can be in the range 1 keylength 256, typically between 5 and 16, corresponding to a key length of 40 -- 128 bits. First, the array 'S' is initialized to the identity permutation. S is then processed for 256 iterations in a similar way to the main PRGA, but also mixes in bytes of the key at the same time.

Incorrect answers:

Blowfish -has a 64-bit block size and a variable key length from 32 bits up to 448 bits. It is a 16-round Feistel cipher and uses large key-dependent S-boxes. In structure it resembles CAST-128, which uses fixed S-boxes.

Twofish -is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.

PIKE-stream cipher was invented by Ross Anderson to be a 'leaner and meaner' version of FISH after he broke FISH in 1994. Its name is supposed to be a humorous allusion to the pike fish.

Which of the following is assured by the use of a hash?

A.
Confidentiality
A.
Confidentiality
Answers
B.
Availability
B.
Availability
Answers
C.
Authentication
C.
Authentication
Answers
D.
Integrity
D.
Integrity
Answers
Suggested answer: D

Explanation:

Integrity

https://en.wikipedia.org/wiki/Cryptographic_hash_function#Verifying_the_integrity_of_messages_and_files

An important application of secure hashes is verification of message integrity. Comparing message digests (hash digests over the message) calculated before, and after, transmission can determine whether any changes have been made to the message or file.

Which method of password cracking takes the most time and effort?

A.
Dictionary attack
A.
Dictionary attack
Answers
B.
Shoulder surfing
B.
Shoulder surfing
Answers
C.
Brute force
C.
Brute force
Answers
D.
Rainbow tables
D.
Rainbow tables
Answers
Suggested answer: C

Explanation:

Brute force

https://en.wikipedia.org/wiki/Brute-force_attack

A brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search.

A brute-force attack is a cryptanalytic attack that can, in theory, be used to attempt to decrypt any encrypted data (except for data encrypted in an information-theoretically secure manner). Such an attack might be used when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier.

Incorrect answers:

Rainbow tables -is a precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a key derivation function (or credit card numbers, etc.) up to a certain length consisting of a limited set of characters.

Dictionary attack -is a form of brute force attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying thousands or millions of likely possibilities, such as words in a dictionary or previously used passwords, often from lists obtained from past security breaches.

Shoulder surfing -is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder, either from keystrokes on a device or sensitive information being spoken and heard, also known as eavesdropping.

Which one of the following terms describes two numbers that have no common factors?

A.
Coprime
A.
Coprime
Answers
B.
Fermat's number
B.
Fermat's number
Answers
C.
Euler's totient
C.
Euler's totient
Answers
D.
Convergent
D.
Convergent
Answers
Suggested answer: A

Explanation:

Coprime

https://en.wikipedia.org/wiki/Coprime_integers

In number theory, two integers a and b are said to be relatively prime, mutually prime, or coprime if the only positive integer (factor) that divides both of them is 1. Consequently, any prime number that divides one of a or b does not divide the other. This is equivalent to their greatest common divisor (gcd) being 1.

Incorrect answers:

Convergent - a series is the sum of the terms of an infinite sequence of numbers.

Euler's totient function - counts the positive integers up to a given integer n that are relatively prime to n. It is written using the Greek letter phi as (n) or (n), and may also be called Euler's phi function. In other words, it is the number of integers k in the range 1 k n for which the greatest common divisor gcd(n, k) is equal to 1. The integers k of this form are sometimes referred to as totatives of n.

Fermat's number - named after Pierre de Fermat, who first studied them, is a positive integer of the form

where n is a non-negative integer.

A ______ refers to a situation where two different inputs yield the same output.

A.
Convergence
A.
Convergence
Answers
B.
Collision
B.
Collision
Answers
C.
Transposition
C.
Transposition
Answers
D.
Substitution
D.
Substitution
Answers
Suggested answer: B

Explanation:

Collision

https://en.wikipedia.org/wiki/Collision_(computer_science)

A collision or clash is a situation that occurs when two distinct pieces of data have the same hash value, checksum, fingerprint, or cryptographic digest.

Total 206 questions
Go to page: of 21