ECES - PRACTICE EXAM QUESTIONS & ANSWERS
Which of the following is generally true about key sizes?
a. Larger key sizes increase security
b. Smaller key sizes increase security
c. Key size is irrelevant to security
d. Key sizes must be more than 256 bits to be secure - Answer -a. Larger key sizes
increase security
How did the ATBASH cipher work?
a. By shifting each letter a certain number of spaces
b. By Multi alphabet substitution
c. By rotating text a given number of spaces
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A
becomes Z, B becomes Y, etc.) - Answer -d. By substituting each letter for the letter
from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.)
DES has a key space of what?
a. 2^128
b. 2^192
c. 2^56
d. 2^64 - Answer -c. 2^56
Which of the following are valid key sizes for AES (choose three)?
a. 56
b. 64
c. 128
d. 192
e. 256
f. 512 - Answer -c. 128
d. 192
e. 256
Which of the following algorithms uses three different keys to encrypt the plain text?
a. AES
b. 3DES
c. Blowfish
d. Skipjack - Answer -b. 3DES
Which of the following is a block cipher?
,a. AES
b. RC4
c. DH
d. RSA - Answer -a. AES
Which of the following is a type of encryption that has two different keys. One key can
encrypt the message and the other key can only decrypt it?
a. Symmetric
b. Asymmetric
c. Block cipher
d. Stream cipher - Answer -b. Asymmetric
Which of the following is an asymmetric cipher?
a. DES
b. RC4
c. RSA
d. AES - Answer -c. RSA
A cipher is defined as what
a. Any algorithm used in cryptography
b. The key used to encrypt a message
c. The algorithm(s) needed to encrypt and decrypt a message
d. Encrypted text - Answer -c. The algorithm(s) needed to encrypt and decrypt a
message
Which of the following is not an asymmetric system?
a. DH
b. AES
c. RSA
d. PGP - Answer -b. AES
John is going to use RSA to encrypt a message to Joan. What key should he use?
a. Joan's public key
b. A shared key
c. Joan's private key
d. A random key - Answer -a. Joan's public key
What advantage do symmetric algorithms have over asymmetric algorithms
a. They are faster
, b. They are more secure
c. It is easier to exchange keys
d. It is easier to implement them in software - Answer -a. They are faster
A _____ is a function is not reversible.
a. Stream cipher
b. Asymmetric cipher
c. Hash
d. Block Cipher - Answer -c. Hash
Which of the following is a protocol for exchanging keys?
a. EC
b. RSA
c. DH
d. RSA - Answer -c. DH
Which of the following would be the fastest
a. AES
b. RSA
c. DH
d. EC - Answer -a. AES
Which of the following would be the weakest encryption algorithm?
a. AES
b. RSA
c. DES
d. EC - Answer -c. DES
What is the largest key size that AES can use?
a. 56
b. 128
c. 256
d. 512 - Answer -c. 256
All of the following are key exchange protocols except for____
a. DH
b. AES
c. MQV
d. ECDH - Answer -b. AES
Which of the following is generally true about key sizes?
a. Larger key sizes increase security
b. Smaller key sizes increase security
c. Key size is irrelevant to security
d. Key sizes must be more than 256 bits to be secure - Answer -a. Larger key sizes
increase security
How did the ATBASH cipher work?
a. By shifting each letter a certain number of spaces
b. By Multi alphabet substitution
c. By rotating text a given number of spaces
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A
becomes Z, B becomes Y, etc.) - Answer -d. By substituting each letter for the letter
from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.)
DES has a key space of what?
a. 2^128
b. 2^192
c. 2^56
d. 2^64 - Answer -c. 2^56
Which of the following are valid key sizes for AES (choose three)?
a. 56
b. 64
c. 128
d. 192
e. 256
f. 512 - Answer -c. 128
d. 192
e. 256
Which of the following algorithms uses three different keys to encrypt the plain text?
a. AES
b. 3DES
c. Blowfish
d. Skipjack - Answer -b. 3DES
Which of the following is a block cipher?
,a. AES
b. RC4
c. DH
d. RSA - Answer -a. AES
Which of the following is a type of encryption that has two different keys. One key can
encrypt the message and the other key can only decrypt it?
a. Symmetric
b. Asymmetric
c. Block cipher
d. Stream cipher - Answer -b. Asymmetric
Which of the following is an asymmetric cipher?
a. DES
b. RC4
c. RSA
d. AES - Answer -c. RSA
A cipher is defined as what
a. Any algorithm used in cryptography
b. The key used to encrypt a message
c. The algorithm(s) needed to encrypt and decrypt a message
d. Encrypted text - Answer -c. The algorithm(s) needed to encrypt and decrypt a
message
Which of the following is not an asymmetric system?
a. DH
b. AES
c. RSA
d. PGP - Answer -b. AES
John is going to use RSA to encrypt a message to Joan. What key should he use?
a. Joan's public key
b. A shared key
c. Joan's private key
d. A random key - Answer -a. Joan's public key
What advantage do symmetric algorithms have over asymmetric algorithms
a. They are faster
, b. They are more secure
c. It is easier to exchange keys
d. It is easier to implement them in software - Answer -a. They are faster
A _____ is a function is not reversible.
a. Stream cipher
b. Asymmetric cipher
c. Hash
d. Block Cipher - Answer -c. Hash
Which of the following is a protocol for exchanging keys?
a. EC
b. RSA
c. DH
d. RSA - Answer -c. DH
Which of the following would be the fastest
a. AES
b. RSA
c. DH
d. EC - Answer -a. AES
Which of the following would be the weakest encryption algorithm?
a. AES
b. RSA
c. DES
d. EC - Answer -c. DES
What is the largest key size that AES can use?
a. 56
b. 128
c. 256
d. 512 - Answer -c. 256
All of the following are key exchange protocols except for____
a. DH
b. AES
c. MQV
d. ECDH - Answer -b. AES