100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ECES Certified Encryption Specialist Review UPDATED ACTUAL Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
25-02-2025
Written in
2024/2025

ECES Certified Encryption Specialist Review UPDATED ACTUAL Exam Questions and CORRECT Answers What term below best describes an attack in which the attacker obtains ciphertext corresponding to a set of plaintexts to use in an attempt to derive the key used? - CORRECT ANSWER - Chosen plaintext Which attack is like a chosen-plaintext attack, except the attacker can obtain ciphertexts encrypted under two different keys? - CORRECT ANSWER - Related-key Attack

Show more Read less
Institution
Certified Encryption Specialist
Course
Certified Encryption Specialist









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Certified Encryption Specialist
Course
Certified Encryption Specialist

Document information

Uploaded on
February 25, 2025
Number of pages
11
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • eces certified encryption

Content preview

ECES Certified Encryption Specialist Review
UPDATED ACTUAL Exam Questions and
CORRECT Answers
What term below best describes an attack in which the attacker obtains ciphertext corresponding
to a set of plaintexts to use in an attempt to derive the key used? - CORRECT ANSWER -
Chosen plaintext


Which attack is like a chosen-plaintext attack, except the attacker can obtain ciphertexts
encrypted under two different keys? - CORRECT ANSWER - Related-key Attack


What is a known plaintext attack and uses a linear approximation to describe the behavior of the
block cipher and was invented by Mitsarue Matsui ? - CORRECT ANSWER - Linear
Cryptanalysis


From the list below, what term describes a mechanism used to create number streams with
random properties? Examples include Lagged Fibonacci and Mersenne Twister. - CORRECT
ANSWER - Pseudo-random number generator (PRNG)


What term from the list below best describes a number whose factors are 1 and itself? -
CORRECT ANSWER - Prime


Which term from the list below represents the total number of possible values of keys in a
cryptographic algorithm or other security measure? - CORRECT ANSWER - Key space


Which term from the list below represents the entire cryptographic operation i.e. the algorithm,
key, and key management functions? - CORRECT ANSWER - Cryptosystem


Which cipher makes use of a 5x5 table containing a keyword or key phrase and encrypts pairs of
letters or digraphs? - CORRECT ANSWER - Playfair

, Which cipher entails using a rod of a certain length to create/encrypt a message, and the
requiring the message recipient to use an identical sized rod to read/decrypt the message? -
CORRECT ANSWER - Scytale


What type of cryptanalysis involves the examination of differences in an input and how that
affects the resultant difference in output? - CORRECT ANSWER - Differential cryptanalysis


Which WiFi encryption standard is based on 802.11i and uses AES with CCMP to provide for
enhanced confidentiality, integrity and authentication? - CORRECT ANSWER - WPA-2



What are the two types of symmetric encryption? - CORRECT ANSWER - Block and Stream



Which of the following is true of hash encryption? - CORRECT ANSWER - Accepts a
variable length input and produces a fixed length output


Which of the following is NOT required for a hash? - CORRECT ANSWER - Minimum key
length


Which of the following are required for a hash? - CORRECT ANSWER - input can be any
length and output has a fixed length, is one-way and collision-free


Which software-based stream cipher uses a lagged Fibonacci generator? - CORRECT
ANSWER - FISH



The Advanced Encryption Standard is a subset of which algorithm? - CORRECT ANSWER -
Rijndael


From the list below, which term is best described as random bits added to a password hash to
help with safeguarding passwords in storage? - CORRECT ANSWER - Salt

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1074
Member since
1 year
Number of followers
102
Documents
68976
Last sold
1 day ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

170 reviews

5
73
4
30
3
45
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions