ExamGecko
Home Home / ECCouncil / 212-81

ECCouncil 212-81 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











A real time protocol for verifying certificates (and a newer method than CRL).

A.
Online Certificate Status Protocol (OCSP)
A.
Online Certificate Status Protocol (OCSP)
Answers
B.
Server-based Certificate Validation Protocol (SCVP)
B.
Server-based Certificate Validation Protocol (SCVP)
Answers
C.
Public Key Infrastructure (PKI)
C.
Public Key Infrastructure (PKI)
Answers
D.
Registration Authority (RA)
D.
Registration Authority (RA)
Answers
Suggested answer: A

Explanation:

Online Certificate Status Protocol (OCSP)

https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol

The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate. It is described in RFC 6960 and is on the Internet standards track. It was created as an alternative to certificate revocation lists (CRL), specifically addressing certain problems associated with using CRLs in a public key infrastructure (PKI).

Incorrect answers:

Public Key Infrastructure (PKI) - set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.

Registration Authority (RA) - omponent of PKI that validates the identity of an entity requesting a digital certificate.

Server-based Certificate Validation Protocol (SCVP) - Internet protocol for determining the path between an X.509 digital certificate and a trusted root (Delegated Path Discovery) and the validation of that path (Delegated Path Validation) according to a particular validation policy.

Which of the following is not a key size used by AES?

A.
128 bits
A.
128 bits
Answers
B.
192 bits
B.
192 bits
Answers
C.
256 bits
C.
256 bits
Answers
D.
512 b
D.
512 b
Answers
Suggested answer: D

Explanation:

512 bits

https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

AES is a subset of the Rijndael block cipher developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal to NIST during the AES selection process. Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.

Which one of the following is an authentication method that sends the username and password in cleartext?

A.
PAP
A.
PAP
Answers
B.
CHAP
B.
CHAP
Answers
C.
Kerberos
C.
Kerberos
Answers
D.
SPAP
D.
SPAP
Answers
Suggested answer: A

Explanation:

PAP

https://en.wikipedia.org/wiki/Password_Authentication_Protocol

Password Authentication Protocol (PAP) is a password-based authentication protocol used by Point to Point Protocol (PPP) to validate users. Almost all network operating system remote servers support PAP. PAP is specified in RFC 1334.

PAP is considered a weak authentication scheme (weak schemes are simple and have lighter computational overhead but are much more vulnerable to attack; while weak schemes may have limited application in some constrained environments, they are avoided in general). Among PAP's deficiencies is the fact that it transmits unencrypted passwords (i.e. in plain-text) over the network. PAP is therefore used only as a last resort when the remote server does not support a stronger scheme such as CHAP or EAP.

Incorrect answers:

SPAP - Shiva Password Authentication Protocol, PAP with encryption for the usernames/passwords that are transmitted.

CHAP - calculates a hash, shares the hash with the client system, the hash is periodically validated to ensure nothing has changed.

Kerberos - computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client--server model and it provides mutual authentication---both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks.

Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication.

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.

A.
Digital Signature
A.
Digital Signature
Answers
B.
Hash
B.
Hash
Answers
C.
Ownership stamp
C.
Ownership stamp
Answers
D.
Digest
D.
Digest
Answers
Suggested answer: A

Explanation:

Digital Signature

https://en.wikipedia.org/wiki/Digital_signature

A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender (authentication), and that the message was not altered in transit (integrity).

Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?

A.
A substitution box where input bits are replaced
A.
A substitution box where input bits are replaced
Answers
B.
A black box for the algorithm implementation
B.
A black box for the algorithm implementation
Answers
C.
A shifting box where input bits are shifted
C.
A shifting box where input bits are shifted
Answers
D.
Another name for the round function
D.
Another name for the round function
Answers
Suggested answer: A

Explanation:

Substitution box where input bits are replaced

https://en.wikipedia.org/wiki/S-box

In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution. In block ciphers, they are typically used to obscure the relationship between the key and the ciphertext --- Shannon's property of confusion.

A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.

A.
TIGER
A.
TIGER
Answers
B.
GOST
B.
GOST
Answers
C.
MD5
C.
MD5
Answers
D.
MD6
D.
MD6
Answers
Suggested answer: D

Explanation:

MD6

https://en.wikipedia.org/wiki/MD6

The MD6 Message-Digest Algorithm is a cryptographic hash function. It uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.[2] The source code of the reference implementation was released under MIT license.

Speeds in excess of 1 GB/s have been reported to be possible for long messages on 16-core CPU architecture.

In December 2008, Douglas Held of Fortify Software discovered a buffer overflow in the original MD6 hash algorithm's reference implementation. This error was later made public by Ron Rivest on 19 February 2009, with a release of a corrected reference implementation in advance of the Fortify Report.

What size block does FORK256 use?

A.
64
A.
64
Answers
B.
512
B.
512
Answers
C.
256
C.
256
Answers
D.
128
D.
128
Answers
Suggested answer: B

Explanation:

512

https://en.wikipedia.org/wiki/FORK-256

FORK-256 was introduced at the 2005 NIST Hash workshop and published the following year.[6] FORK-256 uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged

Which of the following algorithms uses three different keys to encrypt the plain text?

A.
Skipjack
A.
Skipjack
Answers
B.
AES
B.
AES
Answers
C.
Blowfish
C.
Blowfish
Answers
D.
3DES
D.
3DES
Answers
Suggested answer: D

Explanation:

3DES

https://en.wikipedia.org/wiki/Triple_DES

Triple DES (3DES) has a three different keys with same size (56-bit).

Incorrect answers:

AES. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.

Blowfish. Blowfish has a 64-bit block size and a variable key length from 32 bits up to 448 bits.

Skipjack. Skipjack uses an 80-bit key to encrypt or decrypt 64-bit data blocks.

Original, unencrypted information is referred to as ____.

A.
text
A.
text
Answers
B.
plaintext
B.
plaintext
Answers
C.
ciphertext
C.
ciphertext
Answers
D.
cleartext
D.
cleartext
Answers
Suggested answer: B

Explanation:

plaintext

https://en.wikipedia.org/wiki/Plaintext

In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. Cleartext usually refers to data that is transmitted or stored unencrypted ('in clear').

Which of the following is a block cipher?

A.
AES
A.
AES
Answers
B.
DH
B.
DH
Answers
C.
RC4
C.
RC4
Answers
D.
RSA
D.
RSA
Answers
Suggested answer: A

Explanation:

AES

https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

AES is a subset of the Rijndael block cipher developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal to NIST during the AES selection process

Incorrect answers:

RC4. RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher.

DH. Diffie--Hellman key exchange is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.

RSA. RSA (Rivest--Shamir--Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.

Total 206 questions
Go to page: of 21