Free 212-81 Exam Braindumps (page: 14)

Page 14 of 50

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

  1. PKI
  2. DES
  3. RSA
  4. Diffie-Helmann

Answer(s): C

Explanation:

RSA
https://en.wikipedia.org/wiki/RSA_(cryptosystem)
RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977. An equivalent system was developed secretly, in 1973 at GCHQ (the British signals intelligence agency), by the English mathematician Clifford Cocks. That system was declassified in 1997.

Incorrect answers:
Diffie-Helmann - The first publicly described asymmetric algorithm. A cryptographic protocol that allows two parties to establish a shared key over an insecure channel. Often used to allow parties to exchange a symmetric key through some unsecure medium, such as the Internet. It was developed by Whitfield Diffie and Martin Helmann in 1976.
DES - The Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for applications, it has been highly influential in the advancement of cryptography.
Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data. In 1976, after consultation with the National Security Agency (NSA), the NBS selected a slightly modified version (strengthened against differential cryptanalysis, but weakened against brute-force attacks), which was published as an official Federal Information Processing Standard (FIPS) for the United States in 1977.
PKI - A public key infrastructure is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.



A cryptanalysis success where the attacker deduces the secret key.

  1. Information Deduction
  2. Avalanche effect
  3. Shannon's Entropy
  4. Total Break

Answer(s): D

Explanation:

Total Break https://en.wikipedia.org/wiki/Cryptanalysis
The results of cryptanalysis can also vary in usefulness. For example, cryptographer Lars Knudsen (1998) classified various types of attack on block ciphers according to the amount and quality of secret information that was discovered:
Total break — the attacker deduces the secret key.
Global deduction — the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.
Instance (local) deduction — the attacker discovers additional plaintexts (or ciphertexts) not previously known.
Information deduction — the attacker gains some Shannon information about plaintexts (or ciphertexts) not previously known.
Distinguishing algorithm — the attacker can distinguish the cipher from a random permutation.

Incorrect answers:
Shannon's Entropy - average level of "information", "surprise", or "uncertainty" inherent in the variable's possible outcomes. The concept of information entropy was introduced by Claude Shannon in his 1948 paper "A Mathematical Theory of Communication".
Avalanche effect - the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single bit), the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext.



All of the following are key exchange protocols except for

  1. MQV
  2. AES
  3. ECDH
  4. DH

Answer(s): B



Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.

  1. Decoding
  2. Substitution
  3. Transposition
  4. Collision

Answer(s): B

Explanation:

Substitution
https://en.wikipedia.org/wiki/Substitution_cipher
In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.
Incorrect answers:
Decoding - the reverse process from encoding - converting the encoded message back into its plaintext format.
Collision - occurs when a hash function generates the same output for different inputs.
Transposition - a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed (the plaintext is reordered). Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt.



Page 14 of 50



Post your Comments and Discuss EC-Council 212-81 exam with other Community members:

Anyah Vincent Ndubuisi commented on December 19, 2024
Microsoft SC 200 SOC, is awesomely good enough for every cybersecurity specialist. Well detailed for freshers also. From Anyah Vincent.Nigeria.
Anonymous
upvote

Shehan commented on December 19, 2024
Superb stuff
Anonymous
upvote

gege commented on December 19, 2024
The questions looks promising and well formatted. But has anyone passed this exam recently? I have heard the exam is very very hard.
Anonymous
upvote

Tejaswini commented on December 19, 2024
For my understanding
Anonymous
upvote

Tejaswini commented on December 19, 2024
Going throught questions for practice
Anonymous
upvote

David commented on December 18, 2024
Nice questions
Anonymous
upvote

Raju commented on December 18, 2024
gave my exam today and many questions were similar though slightly different...I passed with 90%, thanks Braindumps
INDIA
upvote

Bhuppi commented on December 18, 2024
my exam is on 22nd of DEC.
Anonymous
upvote

Mark commented on December 18, 2024
Can someone confirm if these questions are still valid??? After 200-301 v 1.1 has been released? Is the free version enough or were there more of them in the part that is paywalled?
Anonymous
upvote

BT commented on December 18, 2024
test PCEP-30-02 exam
VIET NAM
upvote

anon commented on December 18, 2024
good information for practice
Anonymous
upvote

ABI commented on December 18, 2024
I REYAL LIKE IT
Anonymous
upvote

Manasa commented on December 18, 2024
GOOD PRACTICING
Anonymous
upvote

swathi commented on December 18, 2024
In my opinion, they work well for me, but it depends on how you approach them. My method isn't about memorizing the exact questions and answers from the practice tests to use on the real exam. Instead, I focus on understanding why I got certain questions wrong so I can deepen my comprehension of the material.
Anonymous
upvote

ABI commented on December 18, 2024
IF HELPS FOR EXAM
Anonymous
upvote

swathi commented on December 18, 2024
it is good compared to other sites
Anonymous
upvote

n commented on December 18, 2024
challenging
Anonymous
upvote

vallepu Ankamma commented on December 18, 2024
useful for the exam
Anonymous
upvote

ADJOA commented on December 17, 2024
good resources
Anonymous
upvote

VALLEPU ANKAMMA commented on December 17, 2024
These questions are very useful for exam
Anonymous
upvote

Jagadeeswara Reddy Sirigireddy commented on December 17, 2024
Looking for Terraform Associate exam dumps.
Anonymous
upvote

Austin commented on December 17, 2024
OK ok When the VM becomes infected with data encrypting ransomware, you decide to recover the VM's files. Which of the following is TRUE in this scenario?
INDIA
upvote

KEMISO ABEBE BEKERE commented on December 17, 2024
GRE FREE CERTIFICATE TEST
Anonymous
upvote

Krishna commented on December 16, 2024
It's very helpful for exam
AUSTRALIA
upvote

nana commented on December 16, 2024
good information for practice
Anonymous
upvote

Nice commented on December 16, 2024
Nice nice nice
Anonymous
upvote

Jonas commented on December 16, 2024
Interesting
Anonymous
upvote

Gosia commented on December 16, 2024
Hi, did you have the same questions on exams?
POLAND
upvote

tom commented on December 16, 2024
it is very good
HONG KONG
upvote

sk commented on December 16, 2024
very usefull
Anonymous
upvote

harsha commented on December 16, 2024
a good way to practice
Anonymous
upvote

Rarebreed commented on December 16, 2024
These Dumps are super duper awesome. I passed my exams from these dumps on 14Th December 2024
NIGERIA
upvote

RJ commented on December 16, 2024
Preparing exam
UNITED STATES
upvote

CY commented on December 15, 2024
quite simple
HONG KONG
upvote