Free 212-81 Exam Braindumps (page: 24)

Page 24 of 50

Which of the following would be the weakest encryption algorithm?

  1. DES
  2. AES
  3. RSA
  4. EC

Answer(s): A

Explanation:

DES
https://en.wikipedia.org/wiki/Data_Encryption_Standard
DES is insecure due to the relatively short 56-bit key size. In January 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes.

Incorrect answers:
AES - has been adopted by the U.S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES),which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. RSA - The security of RSA relies on the practical difficulty of factoring the product of two large prime numbers, the "factoring problem". Breaking RSA encryption is known as the RSA problem. Whether it is as difficult as the factoring problem is an open question. There are no published methods to defeat the system if a large enough key is used.
EC - Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide equivalent security.



What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?

  1. Chosen plaintext
  2. Differential cryptanalysis
  3. Known-plaintext attack
  4. Kasiski examination

Answer(s): A

Explanation:

Chosen plaintext
https://en.wikipedia.org/wiki/Chosen-plaintext_attack
A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts. The goal of the attack is to gain information that reduces the security of the encryption scheme.

Incorrect answers:
Differential cryptanalysis - is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can affect the resultant difference at the output. In the case of a block cipher, it refers to a set of techniques for tracing differences through the network of transformation, discovering where the cipher exhibits non-random behavior, and exploiting such properties to recover the secret key (cryptography key).
Known-plaintext attack - (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext). These can be used to reveal further secret information such as secret keys and code books.
Kasiski examination - (also referred to as Kasiski's test or Kasiski's method) is a method of attacking polyalphabetic substitution ciphers, such as the Vigenère cipher. It was first published by Friedrich Kasiski in 1863, but seems to have been independently discovered by Charles Babbage as early as 1846. In polyalphabetic substitution ciphers where the substitution alphabets are chosen by the use of a keyword, the Kasiski examination allows a cryptanalyst to deduce the length of the keyword. Once the length of the keyword is discovered, the cryptanalyst lines up the ciphertext in n columns, where n is the length of the keyword. Then each column can be treated as the ciphertext of a monoalphabetic substitution cipher. As such, each column can be attacked with frequency analysis.



Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.

  1. Keccak
  2. MD5
  3. SHA-1
  4. TIGER

Answer(s): B

Explanation:

MD5
https://en.wikipedia.org/wiki/MD5
The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption. It remains suitable for other non-cryptographic purposes, for example for determining the partition for a particular key in a partitioned database.
MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as RFC 1321

Incorrect answers:
TIGER - hash. Created by Ross Anderson and Eli Baham. 192/160/128 bit output size, 512 bit block size, 53 bit word size, 24 rounds.
SHA-1 - Secure Hashing Algorithm. Designed by NSA. 160 bit output size, 512 bit block size, 40 bit word size, 80 rounds.
Keccak - SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. SHA-3 is a subset of the broader cryptographic primitive family Keccak, designed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche, building upon RadioGatún.



A technique used to increase the security of block ciphers. It consists of steps that combine the data with portions of the key (most commonly using a simple XOR) before the first round and after the last round of encryption.

  1. Whitening
  2. Key Exchange
  3. Key Schedule
  4. Key Clustering

Answer(s): A

Explanation:

Whitening https://en.wikipedia.org/wiki/Key_whitening
In cryptography, key whitening is a technique intended to increase the security of an iterated block cipher. It consists of steps that combine the data with portions of the key.
The most common form of key whitening is xor-encrypt-xor -- using a simple XOR before the first round and after the last round of encryption.
The first block cipher to use a form of key whitening is DES-X, which simply uses two extra 64-bit keys for whitening, beyond the normal 56-bit key of DES. This is intended to increase the complexity of a brute force attack, increasing the effective size of the key without major changes in the algorithm. DES-X's inventor, Ron Rivest, named the technique whitening.

Incorrect answers:
Key Clustering - different encryption keys generated the same ciphertext from the same plaintext message.
Key Schedule - an algorithm for the key that calculates the subkeys for each round that the encryption goes through.
Key Exchange - a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.



Page 24 of 50



Post your Comments and Discuss EC-Council 212-81 exam with other Community members:

Olympia commented on October 25, 2024
The free version is good but does not have all questions. However the PDF has double the amount of questions and very helpful to pass the exam.
Canada
upvote

Scruzer commented on October 25, 2024
Cleared this exam today. Questions are still valid.
EUROPEAN UNION
upvote

Vidhi Mishra commented on October 25, 2024
Nice set of questions
Anonymous
upvote

Srivats commented on October 25, 2024
Hello, Great learning. Thank you. Looks like Question 13's answer should be D. "If you plan to use the segment again, stop the publish schedule instead" as highlighted in doc.
Anonymous
upvote

Priest-Son commented on October 24, 2024
helpful questions also in other forums
UNITED STATES
upvote

Simon commented on October 24, 2024
guys waht do you think about this dump?
Anonymous
upvote

Kay commented on October 24, 2024
There's new test updated for network+: N10-009. Hope we could have it soon.
Anonymous
upvote

John Como commented on October 24, 2024
Very helpful
UNITED STATES
upvote

saif Ali commented on October 24, 2024
for Question no 50 The answer would be using lambda vdf as this provides automation
INDIA
upvote

Baghya commented on October 24, 2024
Yeh dumps use kiye aur exam mein pass ho gaya.
INDIA
upvote

Varma commented on October 24, 2024
Thanks team and Thanks to these dumps, I’ve never felt so confident about last-minute prep!
INDIA
upvote

Darko commented on October 24, 2024
Passed! let’s just say these dumps were the secret weapon.
EUROPEAN UNION
upvote

Machoo987 commented on October 24, 2024
Studying wasn’t working, so I turned to these dumps—best decision I made since pizza for breakfast!
UNITED STATES
upvote

Zuby commented on October 24, 2024
Nice Question
UNITED STATES
upvote

Chandara commented on October 24, 2024
I passed with ease, and now I have to explain to my friends how ‘studying’ got me through. hahah
INDIA
upvote

Jack commented on October 24, 2024
Muito bom as perguntas
Anonymous
upvote

Diogo Gomes commented on October 24, 2024
As Muhammad Saleem comented, question 20 is wrong. Entities are found in the Data layer and not in the Interface layer.
UNITED STATES
upvote

Neena commented on October 24, 2024
This dump PDF gets the job done
Anonymous
upvote

test commented on October 24, 2024
good one to go through
Anonymous
upvote

Kamal commented on October 24, 2024
I’m 90% sure I owe my new certification to these dumps, and 10% to coffee. LOL Questions are valid and same in the real exam.
Netherlands
upvote

Maseh commented on October 24, 2024
Who knew cramming could be so effective? These dumps saved me from a meltdown!
EUROPEAN UNION
upvote

Drew commented on October 24, 2024
Used these dumps, nailed the exam—now I’m basically a genius (or close enough).
Australia
upvote

Shawn commented on October 24, 2024
As you must know by now the exam is extremely hard. The only way to pass is to know the questions and answers and I found these dump questions very relevant to actual exam.
Canada
upvote

Vidhi Mishra commented on October 24, 2024
Huge set of Cloud Dital leader exam
Anonymous
upvote

jakir commented on October 24, 2024
its really more help full.
BANGLADESH
upvote

TheUser commented on October 23, 2024
So far seems good
Anonymous
upvote

John commented on October 23, 2024
great insight
BOTSWANA
upvote

nigga commented on October 23, 2024
niggaaaaaaaaaa
CANADA
upvote

Chris commented on October 23, 2024
Is this site currently valid for the AZ-900 exam as of October 23, 2024?
Anonymous
upvote

Rian commented on October 23, 2024
Good night comment
Anonymous
upvote

K commented on October 23, 2024
Good Questions
UNITED STATES
upvote

Jayson commented on October 23, 2024
Can someone confirm if this is for the 7th edition or not?
AUSTRALIA
upvote

anonymus commented on October 23, 2024
master database differential backup is not supported in sql server
EUROPEAN UNION
upvote

Arun commented on October 23, 2024
Very useful for cert
GERMANY
upvote