1. Home
  2. Eccouncil
  3. 212-81 ECES PDF

Eccouncil 212-81 PDF Exam Questions:

How to Get Success in Eccouncil 212-81 Exam:

  • Avoid deceptive 212-81 PDF Exam Questions.
  • Focus on 212-81 Questions (PDF) based on the latest exam syllabus.
  • Make notes of Eccouncil 212-81 PDF for better learning.
  • Prepare from our latest Eccouncil 212-81 PDF file and get success in first attempt.
212-81 PDF
Eccouncil 212-81 PDF

Prepare Eccouncil 212-81 Exam Within Short Time

Your knowledge and abilities are validated by passing the Eccouncil 212-81 exam. Our PDF questions and answers will help you prepare for the 212-81 exam in a short time because it includes questions similar to the real Eccouncil exam questions. After downloading the 212-81 Eccouncil PDF exam questions, relevant to the actual exam, you can take a print of all questions and prepare them anytime, anywhere.

Realistic Scenario Based Eccouncil 212-81 PDF Exam Questions:

Everyone wants to become certified Certified Encryption Specialist and improve his/her resume. You should practice with real 212-81 questions. Students can benefit from the 212-81 exam questions which are available in PDF format. The 212-81 exam questions and answers are designed to match the criteria of the actual exam. If you use scenario-based Eccouncil 212-81 questions you will have an extra potential to clear the exam on the first attempt.

Q1.

What is Kerchoff's principle?

Answer: B

See the explanation below.

Only the key needs to be secret, not the actual algorithm

https://en.wikipedia.org/wiki/Kerckhoffs%27s_principle

Kerckhoffs's principle of cryptography was stated by Netherlands born cryptographer Auguste Kerckhoffs in the 19th century: A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.


Q2.

When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.

Answer: C

See the explanation below.

Euler's totient

https://en.wikipedia.org/wiki/Euler%27s_totient_function

In number theory, Euler's totient function counts the positive integers up to a given integer n that are relatively prime to n.

Incorrect answers:

Fibonacci number - commonly denoted Fn, form a sequence, called the Fibonacci sequence, such that each number is the sum of the two preceding ones, starting from 0 and 1.

Fermat's number - named after Pierre de Fermat, who first studied them, is a positive integer of the form Fn = 2^2^n+1 where n is a non-negative integer. The first few Fermat numbers are:

3, 5, 17, 257, 65537, 4294967297, 18446744073709551617, ...

Mersenne prime -- prime number that is one less than a power of two. That is, it is a prime number of the form Mn = 2^n 1 for some integer n. They are named after Marin Mersenne, a French Minim friar, who studied them in the early 17th century.


Q3.

The Clipper chip is notable in the history of cryptography for many reasons. First, it was designed for civilian used secure phones. Secondly, it was designed to use a very specific symmetric cipher. Which one of the following was originally designed to provide built-in cryptography for the Clipper chip?

Answer: C

See the explanation below.

Skipjack

https://en.wikipedia.org/wiki/Clipper_chip

The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured ''voice and data messages' with a built-in backdoor that was intended to ''allow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions.'. It was intended to be adopted by telecommunications companies for voice transmission. Introduced in 1993, it was entirely defunct by 1996.

he Clipper chip used a data encryption algorithm called Skipjack to transmit information and the Diffie--Hellman key exchange-algorithm to distribute the cryptokeys between the peers. Skipjack was invented by the National Security Agency of the U.S. Government; this algorithm was initially classified SECRET, which prevented it from being subjected to peer review from the encryption research community. The government did state that it used an 80-bit key, that the algorithm was symmetric, and that it was similar to the DES algorithm. The Skipjack algorithm was declassified and published by the NSA on June 24, 1998. The initial cost of the chips was said to be $16 (unprogrammed) or $26 (programmed), with its logic designed by Mykotronx, and fabricated by VLSI Technology, Inc (see the VLSI logo on the image on this page).


Q4.

Which of the following is an asymmetric cipher?

Answer: A

See the explanation below.

RSA

https://en.wikipedia.org/wiki/RSA_(cryptosystem)

RSA (Rivest--Shamir--Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977. An equivalent system was developed secretly, in 1973 at GCHQ (the British signals intelligence agency), by the English mathematician Clifford Cocks. That system was declassified in 1997.

In a public-key cryptosystem, the encryption key is public and distinct from the decryption key, which is kept secret (private). An RSA user creates and publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers are kept secret. Messages can be encrypted by anyone, via the public key, but can only be decoded by someone who knows the prime numbers.

Incorrect answers:

DES - is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for applications, it has been highly influential in the advancement of cryptography.

RC4 - RSA (Rivest--Shamir--Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission (stream cipher).

AES - is a subset of the Rijndael block cipher developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal to NIST during the AES selection process. Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.


Q5.

Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?

Answer: C

See the explanation below.

PGP

https://en.wikipedia.org/wiki/Pretty_Good_Privacy

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann developed PGP in 1991.


Reliable Source Of Preparation For Certified Encryption Specialist Exam.

We provide Certified Encryption Specialist certification questions along with answers to assist students in passing the Eccouncil Exam. You can enhance your Eccouncil 212-81 preparation with the help of an online practice engine. Try out our Eccouncil 212-81 questions because 98% of Examskit users passed the final 212-81 exam in one go.