EC-Council Certified Encryption Specialist (ECES) Questions and Answers
Question 25
Which of the following is used to encrypt email and create digital signatures?
Options:
A.
DES
B.
SHA1
C.
AES
D.
RSA
Answer:
D
Explanation:
Explanation:
Explanation
RSA
RSA useĀ for encryption email and create digital signatures
Question 26
RFC 1321 describes what hash?
Options:
A.
RIPEMD
B.
GOST
C.
SHA1
D.
MD5
Answer:
D
Explanation:
Explanation:
Explanation
MD5
MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as RFC 1321.
Question 27
A linear congruential generator is an example of what?
Options:
A.
A coprime generator
B.
A prime number generator
C.
A pseudo random number generator
D.
A random number generator
Answer:
C
Explanation:
Explanation:
A pseudo random number generator
A linear congruential generator (LCG) is an algorithm that yields a sequence of pseudo-randomized numbers calculated with a discontinuous piecewise linear equation. The method represents one of the oldest and best-known pseudorandom number generator algorithms. The theory behind them is relatively easy to understand, and they are easily implemented and fast, especially on computer hardware which can provide modular arithmetic by storage-bit truncation.
Question 28
With Electronic codebook (ECB) what happens:
Options:
A.
The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption
B.
The cipher text from the current round is XORed with the plaintext from the previous round
C.
The block cipher is turned into a stream cipher
D.
The cipher text from the current round is XORed with the plaintext for the next round
Answer:
A
Explanation:
Explanation:
Explanation
The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption
The simplest of the encryption modes is the electronic codebook (ECB) mode (named after conventional physical codebooks). The message is divided into blocks, and each block is encrypted separately.