ECES EC-Council Certified Encryption
Specialist Practice Exam Already Passed
1. How did the ATBASH cipher work? ✔✔By substituting each letter for the letter from the
opposite end of the alphabet (i.e. Abecomes Z, B becomes Y, etc.)
2. DES has a key space of what? ✔✔2^56
3. Which of the following are valid key sizes for AES (choose three)? ✔✔c. 128
d. 192
e. 256
4. Which of the following algorithms uses three different keys to encrypt the plain text?
✔✔3DES
Triple Data Encryption System
5. Which of the following is a block cipher? ✔✔AES
, The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S.
government standard for secure and classified data encryption and decryption.
6. Which of the following is a type of encryption that has two different keys.
One key can encrypt the message and the other key can only decrypt it? ✔✔Asymmetric
7. Which of the following is an asymmetric cipher? ✔✔RSA
The acronym stands for Rivest, Shamir, and Adelman, the inventors of the technique. The RSA
algorithm is based on the fact that there is *no efficient way to factor very large numbers.*
8. A cipher is defined as what ✔✔The algorithm(s) needed to encrypt and decrypt a message
9. Which of the following is not an asymmetric system? ✔✔AES
The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S.
government standard for secure and classified data encryption and decryption.