ECCOUNCIL ECES CERTIFICATION: EXAM DETAILS. SYLLABUS AND QUESTIONS ECCouncil ECES Exam EDUSUM.COM Get complete detail on ECES exam guide to crack ECCouncil Encryption Specialist. You can collect all information on ECES tutorial, practice test, books, study material, exam questions, and syllabus. Firm your knowledge on ECCouncil Encryption Specialist and get ready to crack ECES certification. Explore all information on ECES exam with number of questions, passing percentage and time duration to complete test. WWW.EDUSUM.COM PDF Introduction to ECCouncil Certified Encryption Specialist (ECES) Exam The ECCouncil ECES Exam is challenging and thorough preparation is essential for success. This exam study guide is designed to help you prepare for the ECES certification exam. It contains a detailed list of the topics covered on the Professional exam, as well as a detailed list of preparation resources. These study guides for the ECCouncil Encryption Specialist will help guide you through the study process for your certification. ECES ECCouncil Encryption Specialist Exam Summary ● Exam Name: ECCouncil Encryption Specialist ● Exam Code: ECES ● Exam Price: $249 (USD) ● Duration: 120 mins ● Number of Questions: 50 ECCouncil Certified Encryption Specialist (ECES) 1 WWW.EDUSUM.COM PDF ● Passing Score: 70% ● Books / Training: iClass ● Schedule Exam: Pearson VUE OR ECCouncil Store, ECC Exam Center ● Sample Questions: ECCouncil ECES Sample Questions ● Recommended Practice: ECCouncil ECES Certification Practice Exam Exam Syllabus: ECES ECCouncil Certified Encryption Specialist 1. Introduction and History of Cryptography (8%)  Overview of Cryptography  Understanding MonoAlphabet Substitution Cryptographic Algorithms  Understanding MultiAlphabet Substitution Cryptographic Algorithms  Understanding Homophonic Substitution Cryptographic Algorithms 2. Symmetric Cryptography and Hashes (44%)  Overview of Symmetric Cryptography  Understanding Basic Binary Math in Cryptography  Understanding Symmetric Block Cipher Algorithms  Understanding Symmetric Algorithm Methods  Overview of Symmetric Stream Ciphers  Overview of Cryptographic Hash Algorithms 3. Number Theory and Asymmetric Cryptography (14%)  Overview of Asymmetric Cryptography  Understanding Basic Number Facts  Understanding Birthday Theorem  Understanding Random Number Generators  Overview of Asymmetric Encryption Algorithms 4. Applications of Cryptography (24%)  Overview of Digital Signatures, Digital Certificates, and Digital Certificate Management  Understanding Authentication Protocols  Understanding WiFi Encryption, SSL, and TLS  Understanding VPN and Protocols Used to Create VPN  Understanding File and Disk Encryption  Overview of Steganography and Steganalysis  Overview of National Security Agency Encryption Algorithms ECCouncil Certified Encryption Specialist (ECES) 2 WWW.EDUSUM.COM PDF 5. Cryptanalysis (10%)  Overview of Cryptanalysis  Understanding Cryptanalysis Techniques  Overview of Cryptanalysis Resources and Success  Understanding Password Cracking ECCouncil ECES Certification Sample Questions and Answers To make you familiar with ECCouncil Encryption Specialist (ECES) certification exam structure, we have prepared this sample question set. We suggest you to try our Sample Questions for ECES Certification to test your understanding of ECCouncil ECES process with the real ECCouncil certification exam environment. ECES ECCouncil Encryption Specialist Sample Questions: 01. Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice? a) RC4 b) SHA1 c) AES d) RSA 02. 3DES can best be classified as which one of the following? a) Digital signature b) Asymmetric algorithm c) Hashing algorithm d) Symmetric algorithm 03. Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this. a) Substitution b) Transposition c) Decoding d) Collision 04. Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it? a) Asymmetric ECCouncil Certified Encryption Specialist (ECES) 3 WWW.EDUSUM.COM PDF b) Block cipher c) Stream cipher d) Symmetric 05. How can rainbow tables be defeated? a) Use of nondictionary words b) Password salting c) All uppercase character passwords d) Lockout accounts under brute force password cracking attempts 06. With Cipherblock chaining (CBC) what happens? a) The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption b) The cipher text from the current round is XORed with the plaintext for the next round c) Each block of plaintext is XORed with the previous ciphertext block before being encrypted d) The block cipher is turned into a stream cipher 07. If you use substitution alone, what weakness is present in the resulting cipher text? a) It maintains letter and word frequency b) It is too simple c) It is easily broken with modern computers d) It is the same length as the original text 08. A linear congruential generator is an example of what? a) A coprime generator b) A pseudo random number generator c) A prime number generator d) A random number generator 09. Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security? a) TKIP b) WPA2 c) WPA d) WEP 10. DES has a key space of what? a) 2^56 b) 2^192 c) 2^64 d) 2^128 ECCouncil Certified Encryption Specialist (ECES) 4 WWW.EDUSUM.COM PDF Answers: Answer 1: b Answer 2: d Answer 3: a Answer 4: a Answer 5: b Answer 6: c Answer 7: a Answer 8: b Answer 9: b Answer 10: a ECCouncil Certified Encryption Specialist (ECES) 5
Enter the password to open this PDF file:











