Free 212-81 Exam Braindumps (page: 15)

Page 15 of 50

Changes to one character in the plain text affect multiple characters in the cipher text, unlike in historical algorithms where each plain text character only affect one cipher text character.

  1. Substitution
  2. Avalanche
  3. Confusion
  4. Diffusion

Answer(s): D

Explanation:

Diffusion https://en.wikipedia.org/wiki/Confusion_and_diffusion
Diffusion means that if we change a single bit of the plaintext, then (statistically) half of the bits in the ciphertext should change, and similarly, if we change one bit of the ciphertext, then approximately one half of the plaintext bits should change.[2] Since a bit can have only two states, when they are all re-evaluated and changed from one seemingly random position to another, half of the bits will have changed state.
The idea of diffusion is to hide the relationship between the ciphertext and the plain text.
This will make it hard for an attacker who tries to find out the plain text and it increases the redundancy of plain text by spreading it across the rows and columns; it is achieved through transposition of algorithm and it is used by block ciphers only.

Incorrect answers:
Confusion - Confusion means that each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.
The property of confusion hides the relationship between the ciphertext and the key.
This property makes it difficult to find the key from the ciphertext and if a single bit in a key is changed, the calculation of the values of most or all of the bits in the ciphertext will be affected.
Confusion increases the ambiguity of ciphertext and it is used by both block and stream ciphers. Avalanche - the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single bit), the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext.
Substitution - method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.



What is a TGS?

  1. The server that escrows keys
  2. A protocol for encryption
  3. A protocol for key exchange
  4. The server that grants Kerberos tickets

Answer(s): D

Explanation:

The server that grants Kerberos tickets https://en.wikipedia.org/wiki/Kerberos_(protocol)
The client authenticates itself to the Authentication Server (AS) which forwards the username to a key distribution center (KDC). The KDC issues a ticket-granting ticket (TGT), which is time stamped and encrypts it using the ticket-granting service's (TGS) secret key and returns the encrypted result to the user's workstation. This is done infrequently, typically at user logon; the TGT expires at some point although it may be transparently renewed by the user's session manager while they are logged in.



Which of the following is a key exchange protocol?

  1. MQV
  2. AES
  3. DES
  4. RSA

Answer(s): A

Explanation:

MQV
https://en.wikipedia.org/wiki/MQV
MQV (Menezes–Qu–Vanstone) is an authenticated protocol for key agreement based on the Diffie–Hellman scheme. Like other authenticated Diffie–Hellman schemes, MQV provides protection against an active attacker. The protocol can be modified to work in an arbitrary finite group, and, in particular, elliptic curve groups, where it is known as elliptic curve MQV (ECMQV).

Incorrect answers:
RSA - (Rivest–Shamir–Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977.
AES - Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
DES - Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data.



The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.

  1. Steganography
  2. Cryptosystem
  3. Avalanche effect
  4. Key Schedule

Answer(s): A

Explanation:

Steganography https://en.wikipedia.org/wiki/Steganography
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video.
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to Kerckhoffs's principle.

Incorrect answers:
Avalanche effect - the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single bit), the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext.
Cryptosystem - a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption)
Key Schedule - an algorithm for the key that calculates the subkeys for each round that the encryption goes through.



Page 15 of 50



Post your Comments and Discuss EC-Council 212-81 exam with other Community members:

Zjanri commented on December 07, 2024
This is a good training platform.
Anonymous
upvote

Felicia Simley commented on December 07, 2024
great questions
Anonymous
upvote

Rohan commented on December 07, 2024
Really appreciate thanks, I cleared my exam today
Anonymous
upvote

Manraj commented on December 07, 2024
helpful and similar to exam
Anonymous
upvote

The Magic Beans commented on December 06, 2024
Taking my exam tomorrow Dec 7 / 2024 I will let you know if this questions are similar
UNITED STATES
upvote

Runner009 commented on December 06, 2024
The best money I have ever spent! It literally has all the real exam questions.
UNITED STATES
upvote

Dahamram commented on December 06, 2024
This new version of the exam is pretty tricky. You can tell by going over these questions. I really had no chance of passing if I had not used this exam dump. Questions are pretty valid as of this week.
Anonymous
upvote

Ravendra commented on December 06, 2024
Purchased the full version of this exam dump in PDF with the 50% sale on Black Friday. Got 2 exam for the price of one. Today I sat for this exam and as soon as I saw the first questions I was about to jump out of my seat. The questions are word by word the same. Got 98% in my result. Very happy.
UNITED STATES
upvote

Anand commented on December 06, 2024
Nice questions
UNITED STATES
upvote

Ajit Kumar Vishwakarma commented on December 06, 2024
I want to attend PSE certification; please guide me
Anonymous
upvote

Sangeeta commented on December 06, 2024
Want to attempt pd1 exam
UNITED STATES
upvote

yemane commented on December 06, 2024
Good for exam preparation
Anonymous
upvote

Ramya commented on December 05, 2024
Preparing for snowflake certificate
Anonymous
upvote

Casandra commented on December 05, 2024
Do not book your exam if you don't know the topics and the questions. The test is super duper hard and almost impossible to pass without knowing the questions.
EUROPEAN UNION
upvote

Andi commented on December 05, 2024
Superb no queson
POLAND
upvote

diego commented on December 05, 2024
se ve muy bien
Anonymous
upvote

Carlson Kelvin commented on December 05, 2024
Hope to my exam soon
Anonymous
upvote

ANNONYMOUS commented on December 05, 2024
The questions are quite helpful
Anonymous
upvote

Zary commented on December 05, 2024
Good information
KOREA REPUBLIC OF
upvote

Zari commented on December 05, 2024
Very useful
KOREA REPUBLIC OF
upvote

Mohamed commented on December 05, 2024
It is not free
Anonymous
upvote

Michelle commented on December 04, 2024
Great study material
Anonymous
upvote

Michelle commented on December 04, 2024
Excited about learning more through my studies
Anonymous
upvote

Michelle commented on December 04, 2024
This information has really helped me .
Anonymous
upvote

Michelle commented on December 04, 2024
Great material to get you prepared for the test
Anonymous
upvote

Joseph commented on December 04, 2024
VERY HELPFUL TO ME
Anonymous
upvote

Hassan commented on December 04, 2024
Really its very good
Anonymous
upvote

Aey commented on December 04, 2024
It's verv good?
THAILAND
upvote

Sultan commented on December 04, 2024
Helpful for clearing ACE exam
Anonymous
upvote

Srinivas commented on December 04, 2024
Good collection of questions
UNITED STATES
upvote

xxx commented on December 04, 2024
nice good dump
CANADA
upvote

Rahul commented on December 04, 2024
Very informative
Anonymous
upvote

Luke commented on December 04, 2024
Are these question for the Salesforce Media Cloud Accredited Professional? Can someone answer, please
EUROPEAN UNION
upvote

Madhavisriram25@gmail.com, Madhavi commented on December 03, 2024
I need these dump and the certification name of the exam or link for these exam
Anonymous
upvote