최신 212-81 무료덤프 - EC-COUNCIL Certified Encryption Specialist
A technique used to increase the security of block ciphers. It consists of steps that combine the data with portions of the key (most commonly using a simple XOR) before the first round and after the last round of encryption.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A cryptanalysis success where the attacker deduces the secret key.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A ______ refers to a situation where two different inputs yield the same output.
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Electromechanical rotor-based cipher used in World War II
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
John is going to use RSA to encrypt a message to Joan. What key should he use?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 ≤ Xi ≤ m.
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A linear congruential generator is an example of what?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
During the process of encryption and decryption, what keys are shared?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
What is the largest key size that AES can use?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A list of certificates that have been revoked.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Denis is looking at an older system that uses DES encryption. A colleague has told him that DES is insecure due to a small key size. What is the key length used for DES?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)