ExamGecko
Home Home / ECCouncil / 212-81

ECCouncil 212-81 Practice Test - Questions Answers, Page 5

Question list
Search
Search

Related questions











Which of the following is an asymmetric cipher?

A.
RSA
A.
RSA
Answers
B.
AES
B.
AES
Answers
C.
DES
C.
DES
Answers
D.
RC4
D.
RC4
Answers
Suggested answer: A

Explanation:

RSA

https://en.wikipedia.org/wiki/RSA_(cryptosystem)

RSA (Rivest--Shamir--Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977. An equivalent system was developed secretly, in 1973 at GCHQ (the British signals intelligence agency), by the English mathematician Clifford Cocks. That system was declassified in 1997.

In a public-key cryptosystem, the encryption key is public and distinct from the decryption key, which is kept secret (private). An RSA user creates and publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers are kept secret. Messages can be encrypted by anyone, via the public key, but can only be decoded by someone who knows the prime numbers.

Incorrect answers:

DES - is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for applications, it has been highly influential in the advancement of cryptography.

RC4 - RSA (Rivest--Shamir--Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission (stream cipher).

AES - is a subset of the Rijndael block cipher developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal to NIST during the AES selection process. Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.

Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?

A.
Caesar cipher
A.
Caesar cipher
Answers
B.
RSA
B.
RSA
Answers
C.
PGP
C.
PGP
Answers
D.
DES
D.
DES
Answers
Suggested answer: C

Explanation:

PGP

https://en.wikipedia.org/wiki/Pretty_Good_Privacy

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann developed PGP in 1991.

What is a salt?

A.
Key whitening
A.
Key whitening
Answers
B.
Random bits intermixed with a symmetric cipher to increase randomness and make it more secure
B.
Random bits intermixed with a symmetric cipher to increase randomness and make it more secure
Answers
C.
Key rotation
C.
Key rotation
Answers
D.
Random bits intermixed with a hash to increase randomness and reduce collisions
D.
Random bits intermixed with a hash to increase randomness and reduce collisions
Answers
Suggested answer: D

Explanation:

Random bits intermixed with a hash to increase randomness and reduce collisions

https://en.wikipedia.org/wiki/Salt_(cryptography)

Salt is random data that is used as an additional input to a one-way function that hashes data, a password or passphrase. Salts are used to safeguard passwords in storage. Historically a password was stored in plaintext on a system, but over time additional safeguards were developed to protect a user's password against being read from the system. A salt is one of those methods.

Incorrect answers:

Key whitening - a technique used to increase the security of block ciphers. It consists of steps that combine the data with portions of the key (most commonly using a simple XOR) before the first round and after the last round of encryption.

Key rotation - is when you retire an encryption key and replace that old key by generating a new cryptographic key. Rotating keys on a regular basis help meet industry standards and cryptographic best practices.

Random bits intermixed with a symmetric cipher to increase randomness and make it more secure -- Initialization Vector (IV)

Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?

A.
Atbash
A.
Atbash
Answers
B.
Caesar
B.
Caesar
Answers
C.
Scytale
C.
Scytale
Answers
D.
Vigenere
D.
Vigenere
Answers
Suggested answer: D

Explanation:

Vigenere

https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher

The Vigenre cipher is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword. It employs a form of polyalphabetic substitution.

First described by Giovan Battista Bellaso in 1553, the cipher is easy to understand and implement, but it resisted all attempts to break it until 1863, three centuries later. This earned it the description le chiffre indchiffrable (French for 'the indecipherable cipher'). Many people have tried to implement encryption schemes that are essentially Vigenre ciphers. In 1863, Friedrich Kasiski was the first to publish a general method of deciphering Vigenre ciphers.

Incorrect answers:

Caesar - Monoalphabetic cipher where letters are shifted one or more letters in either direction. The method is named after Julius Caesar, who used it in his private correspondence.

Atbash - Single substitution monoalphabetic cipher that substitutes each letter with its reverse (a and z, b and y, etc).

Scytale - Transposition cipher. A staff with papyrus or letter wrapped around it so edges would line up. There would be a stream of characters which would show you your message. When unwound it would be a random string of characters. Would need an identical size staff on other end for other individuals to decode message.

A symmetric Stream Cipher published by the German engineering firm Seimans in 1993. A software based stream cipher that uses a Lagged Fibonacci generator along with concepts borrowed from shrinking generator ciphers.

A.
DESX
A.
DESX
Answers
B.
FISH
B.
FISH
Answers
C.
Twofish
C.
Twofish
Answers
D.
IDEA
D.
IDEA
Answers
Suggested answer: B

Explanation:

FISH

https://en.wikipedia.org/wiki/FISH_(cipher)

The FISH (FIbonacci SHrinking) stream cipher is a fast software based stream cipher using Lagged Fibonacci generators, plus a concept from the shrinking generator cipher. It was published by Siemens in 1993. FISH is quite fast in software and has a huge key length. However, in the same paper where he proposed Pike, Ross Anderson showed that FISH can be broken with just a few thousand bits of known plaintext.

Incorrect answers:

Twofish - symmetric algorithm. Designed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson. Uses a block size of 128 bits and key sizes of 128, 192, or 256 bits. It is a Feistel cipher.

IDEA - symmetric algorithm. Designed by James Massey and Xuejia Lai. Operates on 64 bit blocks and has a 128 bit key. Consists of 8 identical transformations each round and an output transformation.

DESX - symmetric algorithm. 64 bit key is appended to data, XOR it, and then apply the DES algorithm.

What advantage do symmetric algorithms have over asymmetric algorithms

A.
It is easier to implement them in software
A.
It is easier to implement them in software
Answers
B.
They are more secure
B.
They are more secure
Answers
C.
They are faster
C.
They are faster
Answers
D.
It is easier to exchange keys
D.
It is easier to exchange keys
Answers
Suggested answer: C

Explanation:

They are faster

Symmetric key encryption is much faster than asymmetric key encryption, because both the sender and the recipient of a message to use the same secret key.

Which one of the following is an example of a symmetric key algorithm?

A.
ECC
A.
ECC
Answers
B.
Diffie-Hellman
B.
Diffie-Hellman
Answers
C.
RSA
C.
RSA
Answers
D.
Rijndael
D.
Rijndael
Answers
Suggested answer: D

Explanation:

Rijndael

https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.

Incorrect answers:

ECC - Elliptic-curve cryptography is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide equivalent security.

Diffie--Hellman - key exchange is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.

RSA - Rivest--Shamir--Adleman is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977.

The greatest weakness with symmetric algorithms is _____.

A.
They are less secure than asymmetric
A.
They are less secure than asymmetric
Answers
B.
The problem of key exchange
B.
The problem of key exchange
Answers
C.
The problem of generating keys
C.
The problem of generating keys
Answers
D.
They are slower than asymmetric
D.
They are slower than asymmetric
Answers
Suggested answer: B

Explanation:

The problem of key exchange

https://en.wikipedia.org/wiki/Symmetric-key_algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. This requirement that both parties have access to the secret key is one of the main drawbacks of symmetric key encryption, in comparison to public-key encryption (also known as asymmetric key encryption).

In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?

A.
IPSec does not involve gateways
A.
IPSec does not involve gateways
Answers
B.
Only transport mode can be used
B.
Only transport mode can be used
Answers
C.
Encapsulating Security Payload (ESP) authentication must be used
C.
Encapsulating Security Payload (ESP) authentication must be used
Answers
D.
Only the tunnel mode can be used
D.
Only the tunnel mode can be used
Answers
Suggested answer: D

Explanation:

IPSec has two different modes: transport mode and tunnel mode.

Only the tunnel mode can be used

https://en.wikipedia.org/wiki/IPsec

In tunnel mode, the entire IP packet is encrypted and authenticated. It is then encapsulated into a new IP packet with a new IP header. Tunnel mode is used to create virtual private networks for network-to-network communications (e.g. between routers to link sites), host-to-network communications (e.g. remote user access) and host-to-host communications (e.g. private chat).

Incorrect answers:

Encapsulating Security Payload (ESP) authentication must be used. ESP in transport mode does not provide integrity and authentication for the entire IP packet. However, in Tunnel Mode, where the entire original IP packet is encapsulated with a new packet header added, ESP protection is afforded to the whole inner IP packet (including the inner header) while the outer header (including any outer IPv4 options or IPv6 extension headers) remains unprotected.

IPSec does not involve gateways. Wrong.

Only transport mode can be used. Transport mode, the default mode for IPSec, provides for end-to-end security. It can secure communications between a client and a server. When using the transport mode, only the IP payload is encrypted.

What is the formula m^e %n related to?

A.
Encrypting with EC
A.
Encrypting with EC
Answers
B.
Decrypting with RSA
B.
Decrypting with RSA
Answers
C.
Generating Mersenne primes
C.
Generating Mersenne primes
Answers
D.
Encrypting with RSA
D.
Encrypting with RSA
Answers
Suggested answer: D

Explanation:

Encrypting with RSA

https://en.wikipedia.org/wiki/RSA_(cryptosystem)

RSA Encrypting a message m (number) with the public key (n, e) is calculated:

M' := m^e %n

Incorrect answers:

Decrypting with RSA:

M'' := m^d %n

Generation Mersenne primes:

Mn = 2^n - 1

Encrypting with Elliptic Curve (EC):

y^2 = x^3 + ax + b

Total 206 questions
Go to page: of 21