Package deal
Certified encryption specialist TEST COMPILATION BUNDLE
Certified encryption specialist TEST COMPILATION BUNDLE
[Show more]Certified encryption specialist TEST COMPILATION BUNDLE
[Show more]1. How did the ATBASH cipher work? CORRECT ANSWERS: By substituting each letter for the letter from the opposite end of the alphabet (i.e. Abecomes Z, B becomes Y, etc.) 
 
2. DES has a key space of what? CORRECT ANSWERS: 2^56 
 
3. Which of the following are valid key sizes for AES (choose three)...
Preview 2 out of 6 pages
Add to cart1. How did the ATBASH cipher work? CORRECT ANSWERS: By substituting each letter for the letter from the opposite end of the alphabet (i.e. Abecomes Z, B becomes Y, etc.) 
 
2. DES has a key space of what? CORRECT ANSWERS: 2^56 
 
3. Which of the following are valid key sizes for AES (choose three)...
PKCS #1 CORRECT ANSWERS: RSA Cryptography Standard 
 
PKCS #3 CORRECT ANSWERS: Diffie-Hellman Key Agreement Standard 
 
PKCS #5/RFC 2898 CORRECT ANSWERS: Password-based Encryption Standard 
 
PKCS #8 CORRECT ANSWERS: Private-Key Information Syntax Standard 
 
PKCS #13 CORRECT ANSWERS: Elliptic ...
Preview 2 out of 7 pages
Add to cartPKCS #1 CORRECT ANSWERS: RSA Cryptography Standard 
 
PKCS #3 CORRECT ANSWERS: Diffie-Hellman Key Agreement Standard 
 
PKCS #5/RFC 2898 CORRECT ANSWERS: Password-based Encryption Standard 
 
PKCS #8 CORRECT ANSWERS: Private-Key Information Syntax Standard 
 
PKCS #13 CORRECT ANSWERS: Elliptic ...
What term below best describes an attack in which the attacker obtains ciphertext corresponding to a set of plaintexts to use in an attempt to derive the key used? CORRECT ANSWERS: Chosen plaintext 
 
Which attack is like a chosen-plaintext attack, except the attacker can obtain ciphertexts encrypt...
Preview 2 out of 8 pages
Add to cartWhat term below best describes an attack in which the attacker obtains ciphertext corresponding to a set of plaintexts to use in an attempt to derive the key used? CORRECT ANSWERS: Chosen plaintext 
 
Which attack is like a chosen-plaintext attack, except the attacker can obtain ciphertexts encrypt...
Start your Preparation for EC-Council ECSS v9 and become EC-Council Security Specialist certified with . Here you get online practice tests prepared and approved by EC-Council certified experts based on their own certification exam experience. Here, you also get the detailed and regularly updated sy...
Preview 1 out of 3 pages
Add to cartStart your Preparation for EC-Council ECSS v9 and become EC-Council Security Specialist certified with . Here you get online practice tests prepared and approved by EC-Council certified experts based on their own certification exam experience. Here, you also get the detailed and regularly updated sy...
1. How did the ATBASH cipher work? 
 
a. By shifting each letter a certain number of spaces 
b. By Multi alphabet substitution 
c. By rotating text a given number of spaces 
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.) COR...
Preview 1 out of 4 pages
Add to cart1. How did the ATBASH cipher work? 
 
a. By shifting each letter a certain number of spaces 
b. By Multi alphabet substitution 
c. By rotating text a given number of spaces 
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.) COR...
What type of encryption uses different keys to encrypt and decrypt the message? CORRECT ANSWERS: Asymmetric 
 
The most widely used asymmetric encryption algorithim is what? CORRECT ANSWERS: RSA 
 
Original, unencrypted information is referred to as ____. CORRECT ANSWERS: Plaintext 
 
Which of th...
Preview 1 out of 4 pages
Add to cartWhat type of encryption uses different keys to encrypt and decrypt the message? CORRECT ANSWERS: Asymmetric 
 
The most widely used asymmetric encryption algorithim is what? CORRECT ANSWERS: RSA 
 
Original, unencrypted information is referred to as ____. CORRECT ANSWERS: Plaintext 
 
Which of th...
Cryptography - Krytos = Hidden; Grafo = write. Science of altering communication 
 
ATBASH - Hebrew, reverses alphabet 
 
Cylinder - Greeks, spartans 
 
Playfair - 1854, Charles Wheatstone, encrypts two letters at a time 
 
Enigma Machine - Germans, WW2 
 
Symmetric Cryptography - Encryption that us...
Preview 1 out of 3 pages
Add to cartCryptography - Krytos = Hidden; Grafo = write. Science of altering communication 
 
ATBASH - Hebrew, reverses alphabet 
 
Cylinder - Greeks, spartans 
 
Playfair - 1854, Charles Wheatstone, encrypts two letters at a time 
 
Enigma Machine - Germans, WW2 
 
Symmetric Cryptography - Encryption that us...
The most widely used asymmetric encryption algorithm is what? 
 
+Caesar Cipher 
+Vigenere 
+RSA 
+DES CORRECT ANSWERS: RSA 
 
The RSA encryption algorithm is one of the most widely used public key encryption algorithms that have ever been invented. It was created by the three scientists Ronald Riv...
Preview 2 out of 12 pages
Add to cartThe most widely used asymmetric encryption algorithm is what? 
 
+Caesar Cipher 
+Vigenere 
+RSA 
+DES CORRECT ANSWERS: RSA 
 
The RSA encryption algorithm is one of the most widely used public key encryption algorithms that have ever been invented. It was created by the three scientists Ronald Riv...
The science of altering communication so that it cannot be understood without having a key. CORRECT ANSWERS: Cryptography 
 
Simple cipher that uses shifting letters. CORRECT ANSWERS: Caesar Cipher 
 
Used by Hebrews, cipher that reverses the alphabet. CORRECT ANSWERS: Atbash 
 
Cylinder tool use...
Preview 2 out of 9 pages
Add to cartThe science of altering communication so that it cannot be understood without having a key. CORRECT ANSWERS: Cryptography 
 
Simple cipher that uses shifting letters. CORRECT ANSWERS: Caesar Cipher 
 
Used by Hebrews, cipher that reverses the alphabet. CORRECT ANSWERS: Atbash 
 
Cylinder tool use...
What advantage do symmetric algorithms have over asymmetric algorithms CORRECT ANSWERS: Symmetric algorithms are faster than Asymmetric algorithms 
 
Which of the following is generally true about key sizes? CORRECT ANSWERS: Larger key sizes increase security 
 
A ____ is a function is not reversi...
Preview 1 out of 1 pages
Add to cartWhat advantage do symmetric algorithms have over asymmetric algorithms CORRECT ANSWERS: Symmetric algorithms are faster than Asymmetric algorithms 
 
Which of the following is generally true about key sizes? CORRECT ANSWERS: Larger key sizes increase security 
 
A ____ is a function is not reversi...
What type of encryption uses different keys to encrypt and decrypt the message? 
 
+Secure 
+Asymmetric 
+Private key 
+Symmetric CORRECT ANSWERS: Asymmetric 
 
Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. 
 
The most wide...
Preview 2 out of 11 pages
Add to cartWhat type of encryption uses different keys to encrypt and decrypt the message? 
 
+Secure 
+Asymmetric 
+Private key 
+Symmetric CORRECT ANSWERS: Asymmetric 
 
Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. 
 
The most wide...
DSA CORRECT ANSWERS: FIPS 186 
 
AES CORRECT ANSWERS: FIPS 197 
 
MD5 CORRECT ANSWERS: RFC1321 
 
GOST CORRECT ANSWERS: GOST 
 
Block Ciphers CORRECT ANSWERS: Examples include: AES, TwoFish, Serpent, Skipjack, DES, 3DES 
 
Stream Ciphers CORRECT ANSWERS: Examples include: RC4, FISH, Pike 
 
H...
Preview 2 out of 11 pages
Add to cartDSA CORRECT ANSWERS: FIPS 186 
 
AES CORRECT ANSWERS: FIPS 197 
 
MD5 CORRECT ANSWERS: RFC1321 
 
GOST CORRECT ANSWERS: GOST 
 
Block Ciphers CORRECT ANSWERS: Examples include: AES, TwoFish, Serpent, Skipjack, DES, 3DES 
 
Stream Ciphers CORRECT ANSWERS: Examples include: RC4, FISH, Pike 
 
H...
.cer/.crt/.der CORRECT ANSWERS: x.509 Digital Certificates extensions - Typically binary encoded. (.cer is Microsoft convention) 
 
AES Phases CORRECT ANSWERS: 1. SubBytes - non-linear substitution - uses Rijndael S-box 
2. Shiftrows - transposition 
3. MixColumns - mixing 
4. AddRoundKey 
 
IKE ...
Preview 3 out of 20 pages
Add to cart.cer/.crt/.der CORRECT ANSWERS: x.509 Digital Certificates extensions - Typically binary encoded. (.cer is Microsoft convention) 
 
AES Phases CORRECT ANSWERS: 1. SubBytes - non-linear substitution - uses Rijndael S-box 
2. Shiftrows - transposition 
3. MixColumns - mixing 
4. AddRoundKey 
 
IKE ...
How did the ATBASH cipher work? 
a. By shifting each letter a certain number of spaces 
b. By Multi alphabet substitution 
c. By rotating text a given number of spaces 
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.) CORRECT ...
Preview 2 out of 8 pages
Add to cartHow did the ATBASH cipher work? 
a. By shifting each letter a certain number of spaces 
b. By Multi alphabet substitution 
c. By rotating text a given number of spaces 
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.) CORRECT ...
Mono-Alphabet Cipher CORRECT ANSWERS: -this type of cipher substitutes one character of ciphertext for one character of plaintext 
 
Ceasar Cipher CORRECT ANSWERS: -each letter is shifted a fixed number of spaces to the left or right in the alphabet 
 
-the shifting is the "key" 
 
-the shift is...
Preview 3 out of 27 pages
Add to cartMono-Alphabet Cipher CORRECT ANSWERS: -this type of cipher substitutes one character of ciphertext for one character of plaintext 
 
Ceasar Cipher CORRECT ANSWERS: -each letter is shifted a fixed number of spaces to the left or right in the alphabet 
 
-the shifting is the "key" 
 
-the shift is...
How did the ATBASH cipher work? 
 
a. By shifting each letter a certain number of spaces 
b. By Multi alphabet substitution 
c. By rotating text a given number of spaces 
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.) CORREC...
Preview 3 out of 29 pages
Add to cartHow did the ATBASH cipher work? 
 
a. By shifting each letter a certain number of spaces 
b. By Multi alphabet substitution 
c. By rotating text a given number of spaces 
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.) CORREC...
What is cryptography? CORRECT ANSWERS: Noun - 
A) The process or skill of communicating in or deciphering secret writings or ciphers 
B) Secret writing 
Origin - 
Cryptography (or cryptology); derived from word kryptos which means "hidden", and grafo, which means "write", is the study of mess...
Preview 4 out of 38 pages
Add to cartWhat is cryptography? CORRECT ANSWERS: Noun - 
A) The process or skill of communicating in or deciphering secret writings or ciphers 
B) Secret writing 
Origin - 
Cryptography (or cryptology); derived from word kryptos which means "hidden", and grafo, which means "write", is the study of mess...
CrypTool CORRECT ANSWERS: Software which allows encryption of text using historic algorithms 
 
The Enigma Machine CORRECT ANSWERS: In World War II the Germans made use of an electro-mechanical rotor based cipher Known as The Enigma Machine. 
 
Allied cipher machines used in WWII included the Brit...
Preview 3 out of 19 pages
Add to cartCrypTool CORRECT ANSWERS: Software which allows encryption of text using historic algorithms 
 
The Enigma Machine CORRECT ANSWERS: In World War II the Germans made use of an electro-mechanical rotor based cipher Known as The Enigma Machine. 
 
Allied cipher machines used in WWII included the Brit...
Cryptography CORRECT ANSWERS: The process or skill of communicating in or deciphering secret writings 
 
What is a key component of any secure communications. CORRECT ANSWERS: Cryptography 
 
A way to encode a message that would be readable by intended recipients. CORRECT ANSWERS: Cryptography 
 ...
Preview 3 out of 23 pages
Add to cartCryptography CORRECT ANSWERS: The process or skill of communicating in or deciphering secret writings 
 
What is a key component of any secure communications. CORRECT ANSWERS: Cryptography 
 
A way to encode a message that would be readable by intended recipients. CORRECT ANSWERS: Cryptography 
 ...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
No, you only buy these notes for $30.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
77241 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now