ExamGecko
Home Home / ECCouncil / 212-81

ECCouncil 212-81 Practice Test - Questions Answers, Page 8

Question list
Search
Search

Related questions











Which of the following are valid key sizes for AES (choose three)?

A.
192
A.
192
Answers
B.
56
B.
56
Answers
C.
256
C.
256
Answers
D.
128
D.
128
Answers
E.
512
E.
512
Answers
F.
64
F.
64
Answers
Suggested answer: A, C, D

Explanation:

Correct answers: 128, 192, 256

https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

AES is a subset of the Rijndael block cipher developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal to NIST during the AES selection process. Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.

A cipher is defined as what

A.
The algorithm(s) needed to encrypt and decrypt a message
A.
The algorithm(s) needed to encrypt and decrypt a message
Answers
B.
Encrypted text
B.
Encrypted text
Answers
C.
The key used to encrypt a message
C.
The key used to encrypt a message
Answers
D.
Any algorithm used in cryptography
D.
Any algorithm used in cryptography
Answers
Suggested answer: A

Explanation:

The algorithm(s) needed to encrypt and decrypt a message

https://en.wikipedia.org/wiki/Cipher

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption---a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, 'cipher' is synonymous with 'code', as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.

A measure of the uncertainty associated with a random variable.

A.
Collision
A.
Collision
Answers
B.
Whitening
B.
Whitening
Answers
C.
Diffusion
C.
Diffusion
Answers
D.
Entropy
D.
Entropy
Answers
Suggested answer: D

Explanation:

Entropy

https://en.wikipedia.org/wiki/Entropy_(information_theory)

In information theory, the entropy of a random variable is the average level of 'information', 'surprise', or 'uncertainty' inherent in the variable's possible outcomes. The concept of information entropy was introduced by Claude Shannon in his 1948 paper 'A Mathematical Theory of Communication'.

Incorrect answers:

Diffusion - transposition processes used in encryption functions to increase randomness.

Whitening - technique intended to increase the security of an iterated block cipher. It consists of steps that combine the data with portions of the key.

Collision - situation where two different inputs yield the same output.

Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?

A.
Block cipher
A.
Block cipher
Answers
B.
Asymmetric
B.
Asymmetric
Answers
C.
Symmetric
C.
Symmetric
Answers
D.
Stream cipher
D.
Stream cipher
Answers
Suggested answer: B

Explanation:

Asymmetric

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security.

Incorrect answers:

Symmetric - Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

Block cipher - A block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks. It uses an unvarying transformation, that is, it uses a symmetric key.

Stream cipher - A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream.

Which of the following is a substitution cipher used by ancient Hebrew scholars?

A.
Atbash
A.
Atbash
Answers
B.
Vigenere
B.
Vigenere
Answers
C.
Caesar
C.
Caesar
Answers
D.
Scytale
D.
Scytale
Answers
Suggested answer: A

Explanation:

Atbash

https://en.wikipedia.org/wiki/Atbash

Atbash is a monoalphabetic substitution cipher originally used to encrypt the Hebrew alphabet. It can be modified for use with any known writing system with a standard collating order.

Incorrect answers:

Scytale - Transposition cipher. A staff with papyrus or letter wrapped around it so edges would line up. There would be a stream of characters which would show you your message. When unwound it would be a random string of characters. Would need an identical size staff on other end for other individuals to decode message.

Vigenre - method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword. It employs a form of polyalphabetic substitution.

Caesar Cipher - Monoalphabetic cipher where letters are shifted one or more letters in either direction. The method is named after Julius Caesar, who used it in his private correspondence.

A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.

A.
ADFVGX Cipher
A.
ADFVGX Cipher
Answers
B.
ROT13 Cipher
B.
ROT13 Cipher
Answers
C.
Book Ciphers
C.
Book Ciphers
Answers
D.
Cipher Disk
D.
Cipher Disk
Answers
Suggested answer: A

Explanation:

ADFVGX Cipher

https://en.wikipedia.org/wiki/ADFGVX_cipher

ADFGVX cipher was a field cipher used by the German Army on the Western Front during World War I. ADFGVX was in fact an extension of an earlier cipher called ADFGX.

Invented by Lieutenant Fritz Nebel (1891--1977) and introduced in March 1918, the cipher was a fractionating transposition cipher which combined a modified Polybius square with a single columnar transposition.

Incorrect answers:

Book Ciphers - or Ottendorf cipher, is a cipher in which the key is some aspect of a book or other piece of text. Books, being common and widely available in modern times, are more convenient for this use than objects made specifically for cryptographic purposes. It is typically essential that both correspondents not only have the same book, but the same edition.

Cipher Disk - enciphering and deciphering tool developed in 1470 by the Italian architect and author Leon Battista Alberti. He constructed a device, (eponymously called the Alberti cipher disk) consisting of two concentric circular plates mounted one on top of the other. The larger plate is called the 'stationary' and the smaller one the 'moveable' since the smaller one could move on top of the 'stationary'

ROT13 Cipher - simple letter substitution cipher that replaces a letter with the 13th letter after it, in the alphabet. ROT13 is a special case of the Caesar cipher which was developed in ancient Rome.

Message hidden in unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind.

A.
Caesar Cipher
A.
Caesar Cipher
Answers
B.
Null Ciphers
B.
Null Ciphers
Answers
C.
Vigenere Cipher
C.
Vigenere Cipher
Answers
D.
Playfair Cipher
D.
Playfair Cipher
Answers
Suggested answer: B

Explanation:

Null Ciphers

https://en.wikipedia.org/wiki/Null_cipher

A null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material. Today it is regarded as a simple form of steganography, which can be used to hide ciphertext.

Incorrect answers:

Caesar Cipher - Monoalphabetic cipher where letters are shifted one or more letters in either direction. The method is named after Julius Caesar, who used it in his private correspondence.

Vigenre - method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword. It employs a form of polyalphabetic substitution.

Playfair Cipher - manual symmetric encryption technique and was the first literal digram substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of Lord Playfair for promoting its use.

Cryptographic hashes are often used for message integrity and password storage. It is important to understand the common properties of all cryptographic hashes. What is not true about a hash?

A.
Few collisions
A.
Few collisions
Answers
B.
Reversible
B.
Reversible
Answers
C.
Variable length input
C.
Variable length input
Answers
D.
Fixed length output
D.
Fixed length output
Answers
Suggested answer: B

Explanation:

Reversible

https://en.wikipedia.org/wiki/Hash_function

Hash functions are not reversible.

Incorrect answers:

Fixed length output and Variable length input. Hash function receive variable length input and produce fixed length output

Few collisions. Every hash function with more inputs than outputs will necessarily have collisions

John is going to use RSA to encrypt a message to Joan. What key should he use?

A.
A random key
A.
A random key
Answers
B.
Joan's public key
B.
Joan's public key
Answers
C.
A shared key
C.
A shared key
Answers
D.
Joan's private key
D.
Joan's private key
Answers
Suggested answer: B

Explanation:

Joan's public key

https://en.wikipedia.org/wiki/RSA_(cryptosystem)

Suppose Joahn uses Bob's public key to send him an encrypted message. In the message, she can claim to be Alice but Bob has no way of verifying that the message was actually from Alice since anyone can use Bob's public key to send him encrypted messages. In order to verify the origin of a message, RSA can also be used to sign a message.

Suppose Alice wishes to send a signed message to Bob. She can use her own private key to do so. She produces a hash value of the message, raises it to the power of d (modulo n) (as she does when decrypting a message), and attaches it as a 'signature' to the message. When Bob receives the signed message, he uses the same hash algorithm in conjunction with Alice's public key. He raises the signature to the power of e (modulo n) (as he does when encrypting a message), and compares the resulting hash value with the message's actual hash value. If the two agree, he knows that the author of the message was in possession of Alice's private key, and that the message has not been tampered with since.

A _____ is a function that takes a variable-size input m and returns a fixed-size string.

A.
Feistel
A.
Feistel
Answers
B.
Asymmetric cipher
B.
Asymmetric cipher
Answers
C.
Symmetric cipher
C.
Symmetric cipher
Answers
D.
Hash
D.
Hash
Answers
Suggested answer: D

Explanation:

Hash

https://en.wikipedia.org/wiki/Hash_function

A hash function is any function that can be used to map data of arbitrary size to fixed-size values.

Total 206 questions
Go to page: of 21