Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Introduction to Cryptography - C839 - ECES EC-Council Certified Encryption Specialist Practice Exam Latest 2022 with complete solution

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
03-07-2023
Written in
2022/2023

Introduction to Cryptography - C839 - ECES EC-Council Certified Encryption Specialist Practice Exam Latest 2022 with complete solution 1. How did the ATBASH cipher work? By substituting each letter for the letter from the opposite end of the alphabet (i.e. Abecomes Z, B becomes Y, etc.) 2. DES has a key space of what? 2^56 3. Which of the following are valid key sizes for AES (choose three)? c. 128 d. 192 e. 256 4. Which of the following algorithms uses three different keys to encrypt the plain text? 3DES Triple Data Encryption System 5. Which of the following is a block cipher? AES The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption. 6. Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it? Asymmetric 7. Which of the following is an asymmetric cipher? RSA The acronym stands for Rivest, Shamir, and Adelman, the inventors of the technique. The RSA algorithm is based on the fact that there is no efficient way to factor very large numbers. 8. A cipher is defined as what The algorithm(s) needed to encrypt and decrypt a message 9. Which of the following is not an asymmetric system? AES The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption. 10. John is going to use RSA to encrypt a message to Joan. What key should he use? Joan's public key 11. What advantage do symmetric algorithms have over asymmetric algorithms Symmetric algorithms are faster than Asymmetric algorithms

Show more Read less
Institution
Course

Content preview

Introduction to Cryptography - C839 - ECES EC-Council
Certified Encryption Specialist Practice Exam Latest 2022
with complete solution
1. How did the ATBASH cipher work?
By substituting each letter for the letter from the opposite end of the alphabet (i.e.
Abecomes Z, B becomes Y, etc.)
2. DES has a key space of what?
2^56
3. Which of the following are valid key sizes for AES (choose three)?
c. 128
d. 192
e. 256
4. Which of the following algorithms uses three different keys to encrypt the plain
text?
3DES

Triple Data Encryption System
5. Which of the following is a block cipher?
AES

The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm
and U.S. government standard for secure and classified data encryption and decryption.
6. Which of the following is a type of encryption that has two different keys.

One key can encrypt the message and the other key can only decrypt it?
Asymmetric
7. Which of the following is an asymmetric cipher?
RSA

The acronym stands for Rivest, Shamir, and Adelman, the inventors of the technique.
The RSA algorithm is based on the fact that there is no efficient way to factor very
large numbers.
8. A cipher is defined as what
The algorithm(s) needed to encrypt and decrypt a message
9. Which of the following is not an asymmetric system?
AES

The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm
and U.S. government standard for secure and classified data encryption and decryption.
10. John is going to use RSA to encrypt a message to Joan. What key should he
use?
Joan's public key
11. What advantage do symmetric algorithms have over asymmetric algorithms
Symmetric algorithms are faster than Asymmetric algorithms

, 12. Which of the following is generally true about key sizes?
Larger key sizes increase security
13. A ____ is a function is not reversible.
Hash
14. Which of the following is a protocol for exchanging keys?
DH

Diffie-Hellman is a way of generating a shared secret between two people in such a
way that the secret can't be seen by observing the communication. That's an important
distinction: You're not sharing information during the key exchange, you're creating a
key together.
15. Which of the following would be the fastest process?
AES

The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm
and U.S. government standard for secure and classified data encryption and decryption.
16. Which of the following would be the weakest encryption algorithm?
DES

Data Encryption Standard
17. What is the largest key size that AES can use?
256
18. What are a few different key exchange protocols?
MED

DH - Diffie-Hellman
MQV - Menezes-Qu-Vanstone is an authenticated protocol for key agreement based
on the Diffie-Hellman scheme
ECDH - ECDH is a variant of the Diffie-Hellman algorithm for elliptic curves

AES is not a key exchange protocol; it is a Symmetric Block Cipher
19. Which of the following is a key exchange protocol?
MQV

MQV (Menezes-Qu-Vanstone) is an authenticated protocol for key agreement based on
the Diffie-Hellman scheme. Like other authenticated Diffie-Hellman schemes, MQV
provides protection against an active attacker.
20. Which of the following encryption algorithms relies on the inability to factor
large prime numbers?
RSA

The acronym stands for Rivest, Shamir, and Adelman, the inventors of the technique.
The RSA algorithm is based on the fact that there is no efficient way to factor very
large numbers.
21. Using substitution without transposition leads to what weakness?
Letter/word frequency is maintained

Written for

Course

Document information

Uploaded on
July 3, 2023
Number of pages
5
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$8.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
magdamwikash23 Western Governers University
Follow You need to be logged in order to follow users or courses
Sold
114
Member since
3 year
Number of followers
94
Documents
5328
Last sold
4 days ago
Magda

NURSING STUDY GUIDES/EXAMS AND NOTES ALL VERIFIED BY EXPERTS All my uploaded documents, exams and essays are verified by relevant experts.I can assure an A or at least 90% if you use any of my documents.

3.9

14 reviews

5
7
4
2
3
2
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions