100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
EC-Council Certified Encryption Specialist v2 (ECES) - Practice Revised Questions and Answers / Guaranteed Pass £18.41   Add to cart

Exam (elaborations)

EC-Council Certified Encryption Specialist v2 (ECES) - Practice Revised Questions and Answers / Guaranteed Pass

 8 views  1 purchase
  • Module
  • EC-Council Certified Encryption Specialist v2 (ECE
  • Institution
  • EC-Council Certified Encryption Specialist V2 (ECE

_____ algorithms registered by the National Institute of Standards and Technology (NIST) but are not Federal Information Processing Standards (FIPS) published. They are unevaluated commercial cryptographic equipment, assemblies, or components that neither NSA nor NIST certify for any government ...

[Show more]

Preview 4 out of 44  pages

  • August 11, 2024
  • 44
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • EC-Council Certified Encryption Specialist v2 (ECE
  • EC-Council Certified Encryption Specialist v2 (ECE
avatar-seller
EC-Council Certified Encryption Specialist v2 (ECES) -
Practice Revised Questions and Answers / Guaranteed
Pass
______ algorithms registered by the National Institute of Standards and Technology (NIST) but are not
Federal Information Processing Standards (FIPS) published. They are unevaluated commercial
cryptographic equipment, assemblies, or components that neither NSA nor NIST certify for any
government usage.

a. NSA Type 1

b. NSA Type 2

c. NSA Type 3

d. NSA Type 4 - d. NSA Type 4



______ algorithms used for unclassified cryptographic equipment, assemblies, or components. Endorsed
by the NSA for use in telecommunications and automated information systems for the protection of
national security information. Approved algorithms include Skipjack and KEA.

a. NSA Type 1

b. NSA Type 2

c. NSA Type 3

d. NSA Type 4 - b. NSA Type 2



______ product is a device for use with Sensitive But Unclassified (SBU) information on non-national
security systems. Approved algorithms include DES, 3DES, SHA, and AES.

a. NSA Type 1

b. NSA Type 2

c. NSA Type 3

d. NSA Type 4 - c. NSA Type 3



______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or
sensitive U.S. government information, including cryptographic equipment, assemblies, or components
classified or certified by NSA for encrypting and decrypting classified and sensitive national security

,information when appropriately keyed. Products include JUNIPER, MAYFLY, FASTHASH, WALBURN, and
PEGASUS.

a. NSA Type 1

b. NSA Type 2

c. NSA Type 3

d. NSA Type 4 - a. NSA Type 1



___________ is changing some part of the plain text for some matching part of cipher text.

a. transposition

b. substitution

c. substitution and transposition

d. confusion - b. substitution



___________ is the swapping of blocks of cipher text.

a. transposition

b. substitution

c. substitution and transposition

d. confusion - a. transposition



____________ cryptography uses one key to encrypt a message and a different key to decrypt it.

a. Asymmetric

b. Symmetric

c. Stream

d. Secure - a. Asymmetric



128 bit hash that is specified by RFC 1321

a. SHA

b. MD5

c. MD6

,d. FORK-256

e. RIPEMD-160

f. GOST

g. TIGER - b. MD5



160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers and Bart Preneel.

a. SHA-1

b. MD6

c. FORK-256

d. RIPEMD-160

e. GOST

f. TIGER - d. RIPEMD-160



3DES block size?

a. 32 bit

b. 64 bit

c. 128 bit

d. 256 bit - b. 64 bit



3DES key size?

a. 56-bit

b. 128-bit

c. 256-bit

d. 512-bit - a. 56-bit



A _____ is a function is not reversible.

a. Stream cipher

b. Asymmetric cipher

, c. Hash

d. Block Cipher - c. Hash



A 160-bit hash function that resembles earlier MD5 algorithm, designed by the NSA to be part of the
Digital Signature Algorithm.

a. SHA-1

b. MD6

c. FORK-256

d. RIPEMD-160

e. GOST

f. TIGER - a. SHA-1



A 192 bit hash function that was designed by Ross Anderson and Eli Biham in 1995.

a. SHA-1

b. MD6

c. FORK-256

d. RIPEMD-160

e. GOST

f. TIGER - f. TIGER



A cipher is defined as what

a. Any algorithm used in cryptography

b. The key used to encrypt a message

c. The algorithm(s) needed to encrypt and decrypt a message

d. Encrypted text - c. The algorithm(s) needed to encrypt and decrypt a message



A Feistel cipher with 16 rounds and a 48-bit round key for each round.

a. AES

b. DES

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Lucindajohns. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £18.41. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67474 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£18.41  1x  sold
  • (0)
  Add to cart