ECES Test Objectives

Atlanta CISO Events


  • What is cryptography
  • Explain history of cryptography
  • What is mono-alphabet substitution
  • What is caesar cipher
  • Discuss atbash cipher
  • What is rot 13?
  • Describe scytale
  • Explain single substitution weaknesses
  • What is multi-alphabet substitution
  • Explain about cipher disk
  • What is vigenère cipher
  • Discuss vigenère cipher: example
  • Describe about the breaking the vigenère cipher
  • What is playfair
  • Explain the ADFGVX cipher
  • Discuss the enigma machine
  • Describe cryptool
  • What is symmetric cryptography
  • Explain the information theory
  • Examine the information theory cryptography concepts
  • What is kerckhoffs's principle
  • What is substitution
  • Explain transposition
  • Discuss substitution and transposition
  • Explain binary math
  • Explain binary AND
  • What is binary OR
  • Explain binary XOR
  • Discuss block cipher vs. Stream cipher
  • Explain symmetric block cipher algorithms
  • What are the basic facts of the feistel function
  • Explain the feistel function
  • How to write a simple view of a single round
  • Explain unbalanced feistel cipher
  • What is des
  • What is 3des
  • Explain desx
  • Discuss whitening
  • What is AES
  • Discuss AES general overview
  • What are AES specifics
  • What is blowfish
  • Discuss serpent
  • Explain twofish
  • What is skipjack
  • Discuss an idea
  • List the symmetric algorithm methods
  • What is an electronic codebook (ECB)
  • Explain cipher-block chaining (CBC)
  • Discuss the propagating cipher-block chaining (PCBC)
  • Explain cipher feedback (CFB)
  • Discuss output feedback (OFB)
  • What is counter (CTR)
  • Explain initialization vector (IV)
  • Discuss symmetric stream ciphers
  • Discuss rc4, fish, and pike
  • What is an hash
  • Explain hash – salt
  • Explain md5
  • Discuss md5 algorithm
  • What is md6
  • Discuss secure hash algorithm (SHA)
  • Explain fork 256
  • Discuss RIPEMD – 160
  • Explain Gost
  • Explain tiger
  • What is an cryptobench
  • Explain asymmetric encryption
  • Discuss basic number facts
  • Explain prime numbers
  • Explain co-prime
  • What is eulers totient
  • Explain modulus operator
  • Discuss fibonacci numbers
  • Explain birthday problem
  • Discuss birthday theorem
  • What is a birthday attack
  • List random number generators
  • Classify random number generators
  • Explain naor-reingold and mersenne twister pseudorandom function
  • Discuss linear congruential generator
  • Discuss lehmer random number generator
  • What is lagged fibonacci generator
  • What is diffie-hellman
  • Explain rivest shamir adleman (RSA)
  • Explain rsa – how it works
  • Explain menezes–qu–vanstone
  • Discuss digital signature algorithm
  • Explain signing with DSA
  • Define elliptic curve
  • Discuss elliptic curve variations
  • What is an elgamal
  • Explain cryptool
  • Discuss various digital signatures
  • What is a digital certificate?
  • Explain x.509
  • What are x.509 certificates
  • Explain x.509 certificate file extensions
  • Discuss certificate authority (CA)
  • Discuss registration authority (RA)
  • Explain public key infrastructure (PKI)
  • Explain digital certificate terminology
  • What is server-based certificate validation protocol
  • Discuss digital certificate management
  • Explain various trust models
  • Explain certificates and web servers
  • Discuss various Microsoft certificate services
  • Explain authentication
  • What is an password authentication protocol (PAP)
  • Explain shiva password authentication protocol (s-PAP)
  • Discuss challenge-handshake authentication protocol (CHAP)
  • What are kerberos
  • Explain components of kerberos system
  • What is pretty good privacy (PGP)
  • Discuss various PGP certificates
  • Explain Wi-Fi encryption
  • Discuss wired equivalent privacy (WEP)
  • What is wpa - wi-fi protected access
  • Discuss WPA2
  • What is SSL
  • Describe TLS
  • What is virtual private network (vpn)
  • Describe point-to-point tunneling protocol (PPTP)
  • What is PPTP VPN
  • Explain layer 2 tunneling protocol VPN
  • Discuss the internet protocol security VPN
  • Explain SSL/VPN
  • How to encrypt files
  • Discuss backing up the EFS key
  • What is restoring the EFS key
  • What is bitlocker
  • Discuss disk encryption software: truecrypt
  • Describe steganography
  • Discuss historical steganography
  • List out other forms of steganography
  • Verify steganography implementations
  • What is steganalysis
  • Explain about steganalysis – raw quick pair
  • Discuss about steganalysis - chi-square analysis
  • Explain steganalysis - audio steganalysis
  • List various steganography detection tools
  • Explain national security agency and cryptography
  • Discuss nsa suite A encryption algorithms
  • Explain nsa suite B encryption algorithms
  • Explain national security agency: type 1 algorithms
  • Discuss national security agency: type 2 algorithms
  • Discuss national security agency: type 3 algorithms
  • Discuss national security agency: type 4 algorithms
  • Explain unbreakable encryption
  • Explain breaking ciphers
  • Discuss cryptanalysis
  • Explain frequency analysis
  • What is kasiski
  • How to crack modern cryptography
  • Cracking modern cryptography: chosen plaintext attack
  • What is linear cryptanalysis
  • Discuss the differential cryptanalysis
  • Explain integral cryptanalysis
  • Discuss cryptanalysis success
  • What is a rainbow table
  • What is password cracking