Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

EC-Council Certified Encryption Specialist (ECES)

Last Update 18 hours ago Total Questions : 206

The EC-Council Certified Encryption Specialist (ECES) content is now fully updated, with all current exam questions added 18 hours ago. Deciding to include 212-81 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 212-81 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 212-81 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any EC-Council Certified Encryption Specialist (ECES) practice test comfortably within the allotted time.

Question # 31

Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.

A.

VPN

B.

PGP

C.

Cryptool

D.

VeraCrypt

Question # 32

This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.

A.

RC4

B.

Blowfish

C.

Twofish

D.

FISH

Question # 33

A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.

A.

Chosen Plaintext Attack

B.

Steganography

C.

Rainbow Tables

D.

Transposition

Question # 34

Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and CA. Receives request, authenticates it and forwards it to the CA.

A.

PKI (Public Key Infrastructure)

B.

TTP (Trusted Third Party)

C.

RA (Registration Authority)

D.

CP (Certificate Policy)

Question # 35

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

A.

Skipjack

B.

Blowfish

C.

MD5

D.

Serpent

Question # 36

A symmetric Stream Cipher published by the German engineering firm Seimans in 1993. A software based stream cipher that uses a Lagged Fibonacci generator along with concepts borrowed from shrinking generator ciphers.

A.

DESX

B.

FISH

C.

Twofish

D.

IDEA

Question # 37

Which of the following is an asymmetric algorithm related to the equation y^2 = x^3 + Ax + B?

A.

Blowfish

B.

Elliptic Curve

C.

AES

D.

RSA

Question # 38

The greatest weakness with symmetric algorithms is _____.

A.

They are less secure than asymmetric

B.

The problem of key exchange

C.

The problem of generating keys

D.

They are slower than asymmetric

Question # 39

A cipher is defined as what

A.

The algorithm(s) needed to encrypt and decrypt a message

B.

Encrypted text

C.

The key used to encrypt a message

D.

Any algorithm used in cryptography

Question # 40

Ferris has been assigned the task of selecting security for his company ' s wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?

A.

WEP

B.

WPA

C.

WPA2

D.

TKIP

Go to page: