Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

212-81 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

212-81 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: EC-Council Certified Encryption Specialist (ECES)
  • Last Update: Apr 24, 2024
  • Questions and Answers: 206
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

212-81 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

212-81 Practice Exam Questions with Answers EC-Council Certified Encryption Specialist (ECES) Certification

Question # 6

Which of the following is a key exchange protocol?

A.

MQV

B.

AES

C.

DES

D.

RSA

Full Access
Question # 7

Denis is looking at an older system that uses DES encryption. A colleague has told him that DES is insecure due to a small key size. What is the key length used for DES?

A.

128

B.

256

C.

56

D.

64

Full Access
Question # 8

Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm.

A.

Blowfish

B.

Rijndael

C.

Lucifer

D.

El Gamal

Full Access
Question # 9

Which of the following statements is most true regarding binary operations and encryption?

A.

They can provide secure encryption

B.

They are only useful as a teaching method

C.

They can form a part of viable encryption methods

D.

They are completely useless

Full Access
Question # 10

Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.

A.

Cipher disk

B.

Caesar cipher

C.

Scytale

D.

Enigma machine

Full Access
Question # 11

If you XOR 10111000 with 10101010, what is the result?

A.

10111010

B.

10101010

C.

11101101

D.

00010010

Full Access
Question # 12

With Cipher-block chaining (CBC) what happens?

A.

The block cipher is turned into a stream cipher

B.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

C.

Each block of plaintext is XORed with the previous ciphertext block before being encrypted

D.

The cipher text from the current round is XORed with the plaintext for the next round

Full Access
Question # 13

Frank is trying to break into an encrypted file… He is attempting all the possible keys that could be used for this algorithm. Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?

A.

Rainbow table

B.

Frequency analysis

C.

Brute force

D.

Kasiski

Full Access
Question # 14

Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?

A.

Caesar cipher

B.

RSA

C.

PGP

D.

DES

Full Access
Question # 15

A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.

A.

ADFVGX Cipher

B.

ROT13 Cipher

C.

Book Ciphers

D.

Cipher Disk

Full Access
Question # 16

John is going to use RSA to encrypt a message to Joan. What key should he use?

A.

A random key

B.

Joan’s public key

C.

A shared key

D.

Joan’s private key

Full Access
Question # 17

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

A.

128 bit and CRC

B.

128 bi and TKIP

C.

128 bit and CCMP

D.

64 bit and CCMP

Full Access
Question # 18

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?

A.

Avalanche

B.

Confusion

C.

Scrambling

D.

Diffusion

Full Access
Question # 19

Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.

A.

VPN

B.

PGP

C.

Cryptool

D.

VeraCrypt

Full Access
Question # 20

Which of the following acts as a verifier for the certificate authority?

A.

Certificate Management system

B.

Directory management system

C.

Registration authority

D.

Certificate authority

Full Access
Question # 21

What is the formula m^e %n related to?

A.

Encrypting with EC

B.

Decrypting with RSA

C.

Generating Mersenne primes

D.

Encrypting with RSA

Full Access
Question # 22

John is trying to explain the basics of cryptography to a group of young, novice, security students. Which one of the following most accurately defines encryption?

A.

Changing a message using complex mathematics

B.

Applying keys to a message to conceal it

C.

Complex mathematics to conceal a message

D.

Changing a message so it can only be easily read by the intended recipient

Full Access
Question # 23

A measure of the uncertainty associated with a random variable.

A.

Collision

B.

Whitening

C.

Diffusion

D.

Entropy

Full Access
Question # 24

Which of the following algorithms uses three different keys to encrypt the plain text?

A.

Skipjack

B.

AES

C.

Blowfish

D.

3DES

Full Access
Question # 25

During the process of encryption and decryption, what keys are shared?

A.

Public keys

B.

Public and private keys

C.

User passwords

D.

Private keys

Full Access
Question # 26

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?

A.

Me mod n

B.

Ce mod n

C.

y2 = x3 + Ax + B

D.

P = Cd mod n

Full Access
Question # 27

What does Output feedback (OFB) do:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

A block cipher is converted into a stream cipher by generating a keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext

D.

The cipher text from the current round is XORed with the plaintext for the next round

Full Access
Question # 28

In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.

A.

Information deduction

B.

Total break

C.

Instance deduction

D.

Global deduction

Full Access
Question # 29

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

A.

Skipjack

B.

Blowfish

C.

MD5

D.

Serpent

Full Access
Question # 30

The most common way steganography is accomplished is via which one of the following?

A.

rsb

B.

Isb

C.

msb

D.

asb

Full Access
Question # 31

You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as

A.

Odd numbers with no divisors

B.

Odd numbers

C.

Any number only divisible by odd numbers

D.

Any number only divisible by one and itself

Full Access
Question # 32

If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.

A.

15

B.

16

C.

3

D.

4

Full Access
Question # 33

Which of the following is an asymmetric algorithm related to the equation y^2 = x^3 + Ax + B?

A.

Blowfish

B.

Elliptic Curve

C.

AES

D.

RSA

Full Access
Question # 34

Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and CA. Receives request, authenticates it and forwards it to the CA.

A.

PKI (Public Key Infrastructure)

B.

TTP (Trusted Third Party)

C.

RA (Registration Authority)

D.

CP (Certificate Policy)

Full Access
Question # 35

Which of the following is a block cipher?

A.

AES

B.

DH

C.

RC4

D.

RSA

Full Access
Question # 36

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access 2 (WPA2)

C.

Wi-Fi Protected Access (WPA)

D.

Temporal Key Integrity Protocol (TKIP)

Full Access
Question # 37

All of the following are key exchange protocols except for____

A.

MQV

B.

AES

C.

ECDH

D.

DH

Full Access
Question # 38

The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.

A.

ElGamal

B.

RSA

C.

PAP

D.

X.509

Full Access
Question # 39

A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used to try to discover patterns and use that information to decrypt the cipher.

A.

Kasiski Method

B.

Birthday Attack

C.

Information Deduction

D.

Integral Cryptanalysis

Full Access
Question # 40

Changes to one character in the plain text affect multiple characters in the cipher text, unlike in historical algorithms where each plain text character only affect one cipher text character.

A.

Substitution

B.

Avalanche

C.

Confusion

D.

Diffusion

Full Access
Question # 41

What is the basis for the FISH algorithm?

A.

The Lagged Fibonacci generator

B.

Prime number theory

C.

Equations that describe an ellipse

D.

The difficulty in factoring numbers

Full Access
Question # 42

Which of the following is a substitution cipher used by ancient Hebrew scholars?

A.

Atbash

B.

Vigenere

C.

Caesar

D.

Scytale

Full Access
Question # 43

Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.

A.

Key Schedule

B.

Key Clustering

C.

Key Space

D.

Key Exchange

Full Access
Question # 44

The Clipper chip is notable in the history of cryptography for many reasons. First, it was designed for civilian used secure phones. Secondly, it was designed to use a very specific symmetric cipher. Which one of the following was originally designed to provide built-in cryptography for the Clipper chip?

A.

Blowfish

B.

Twofish

C.

Skipjack

D.

Serpent

Full Access
Question # 45

What is the basis for the difficulty in breaking RSA?

A.

Hashing

B.

The birthday paradox

C.

Equations that describe an elliptic curve

D.

Factoring numbers

Full Access
Question # 46

Which one of the following are characteristics of a hash function? (Choose two)

A.

Requires a key

B.

One-way

C.

Fixed length output

D.

Symmetric

E.

Fast

Full Access
Question # 47

Which one of the following best describes a process that splits the block of plaintext into two separate blocks, then applies the round function to one half, and finally swaps the two halves?

A.

Block ciphers

B.

Symmetric cryptography

C.

Feistel cipher

D.

Substitution cipher

Full Access
Question # 48

Cryptographic hashes are often used for message integrity and password storage. It is important to understand the common properties of all cryptographic hashes. What is not true about a hash?

A.

Few collisions

B.

Reversible

C.

Variable length input

D.

Fixed length output

Full Access
Question # 49

In a Feistel cipher, the two halves of the block are swapped in each round. What does this provide?

A.

Diffusion

B.

Confusion

C.

Avalanche

D.

Substitution

Full Access
Question # 50

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

A.

Key Schedule

B.

Feistel Network

C.

SHA-2

D.

Diffie-Helman

Full Access
Question # 51

Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?

A.

Cryptography

B.

Steganalysis

C.

Cryptology

D.

Steganography

Full Access
Question # 52

When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.

A.

Mersenne's number

B.

Fermat's number

C.

Euler's totient

D.

Fermat's prime

Full Access
Question # 53

This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.

A.

RC4

B.

Blowfish

C.

Twofish

D.

FISH

Full Access
Question # 54

John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)

A.

Encrypt mode

B.

Transport mode

C.

Tunnel mode

D.

Decrypt mode

Full Access
Question # 55

A list of certificates that have been revoked.

A.

CA

B.

CRL

C.

PCBC

D.

OCSP

Full Access
Question # 56

Which of the following is the standard for digital certificates?

A.

RFC 2298

B.

X.509

C.

CRL

D.

CA

Full Access
Question # 57

A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.

A.

TIGER

B.

GOST

C.

MD5

D.

MD6

Full Access