Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

EC-Council Certified Encryption Specialist (ECES)

Last Update 18 hours ago Total Questions : 206

The EC-Council Certified Encryption Specialist (ECES) content is now fully updated, with all current exam questions added 18 hours ago. Deciding to include 212-81 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 212-81 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 212-81 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any EC-Council Certified Encryption Specialist (ECES) practice test comfortably within the allotted time.

Question # 41

Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?

A.

PIKE

B.

Twofish

C.

RC4

D.

Blowfish

Question # 42

Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?

A.

Block cipher

B.

Asymmetric

C.

Symmetric

D.

Stream cipher

Question # 43

The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).

A.

Odd numbers

B.

Fibonacci Sequence

C.

Fermat pseudoprime

D.

Prime numbers

Question # 44

A number that is used only one time, then discarded is called what?

A.

IV

B.

Nonce

C.

Chain

D.

Salt

Question # 45

In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.

A.

Information deduction

B.

Total break

C.

Instance deduction

D.

Global deduction

Question # 46

Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm.

A.

Blowfish

B.

Rijndael

C.

Lucifer

D.

El Gamal

Question # 47

Frank is trying to break into an encrypted file… He is attempting all the possible keys that could be used for this algorithm. Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?

A.

Rainbow table

B.

Frequency analysis

C.

Brute force

D.

Kasiski

Question # 48

What size block does Skipjack use?

A.

64

B.

512

C.

128

D.

256

Question # 49

Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?

A.

RSA

B.

AES

C.

RC4

D.

SHA-1

Question # 50

Why is quantum computing a threat to RSA?

A.

The processing speed will brute force algorithms

B.

Quantum computers can solve the discrete logarithm problem

C.

Quantum computers can solve the birthday paradox

D.

Quantum computers can factor large integers in polynomial time

Go to page: