Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

EC-Council Certified Encryption Specialist (ECES)

Last Update 18 hours ago Total Questions : 206

The EC-Council Certified Encryption Specialist (ECES) content is now fully updated, with all current exam questions added 18 hours ago. Deciding to include 212-81 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 212-81 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 212-81 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any EC-Council Certified Encryption Specialist (ECES) practice test comfortably within the allotted time.

Question # 11

Storing private keys with a third party is referred to as what?

A.

Key caching

B.

Key storage

C.

Key banking

D.

Key escrow

Question # 12

In 1977 researchers and MIT described what asymmetric algorithm?

A.

DH

B.

RSA

C.

AES

D.

EC

Question # 13

An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k > 1 it is a new technique.

A.

Differential Cryptanalysis

B.

Linear Cryptanalysis

C.

Chosen Plaintext Attack

D.

Integral Cryptanalysis

Question # 14

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.

A.

Digital Signature

B.

Hash

C.

Ownership stamp

D.

Digest

Question # 15

What best describes the shifting of each letter a fixed number of spaces to the left or right?

A.

Single substitution

B.

Multi substitution

C.

XOR

D.

Bit shifting

Question # 16

Which one of the following attempts to hide data in plain view?

A.

Cryptography

B.

Substitution

C.

Steganography

D.

Asymmetric cryptography

Question # 17

Which one of the following is a symmetric key system using 64-bit blocks?

A.

DES

B.

PGP

C.

DSA

D.

RSA

Question # 18

Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?

A.

Pegasus

B.

Blowfish

C.

SHA1

D.

AES

Question # 19

What is the solution to the equation 8 mod 3?

A.

1

B.

4

C.

3

D.

2

Question # 20

How can rainbow tables be defeated?

A.

Lockout accounts under brute force password cracking attempts

B.

All uppercase character passwords

C.

Use of non-dictionary words

D.

Password salting

Go to page: