EC-Council Certified Encryption Specialist -ECES(PKI) Quiz Questions and Answers

Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?

Answer :
  • Asymmetric

A linear congruential generator is an example of what?

Answer :
  • A pseudo random number generator

Original, unencrypted information is referred to as ____.

Answer :
  • plaintext

The greatest weakness with symmetric algorithms is _____.

Answer :
  • The problem of key exchange

A _____ is a function that takes a variable-size input m and returns a fixed-size string.

Answer :
  • Hash

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?

Answer :
  • Diffie-Hellman

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party?

Answer :
  • Digital Signature

What is the standard used by most digital certificates?

Answer :
  • X.509

DES uses keys of what size?

Answer :
  • 56 bits

The technique of moving a given letter a fixed number of spaces to the right or left is called what?

Answer :
  • Single substitution