Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

EC-Council Certified Encryption Specialist (ECES)

Last Update 18 hours ago Total Questions : 206

The EC-Council Certified Encryption Specialist (ECES) content is now fully updated, with all current exam questions added 18 hours ago. Deciding to include 212-81 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 212-81 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 212-81 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any EC-Council Certified Encryption Specialist (ECES) practice test comfortably within the allotted time.

Question # 51

The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.

A.

ElGamal

B.

RSA

C.

PAP

D.

X.509

Question # 52

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.

A.

Rail Fence Cipher

B.

Null Cipher

C.

Vigenere Cipher

D.

ROT-13

Question # 53

Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.

A.

Key

B.

IV

C.

Chain

D.

Salt

Question # 54

Encryption of the same plain text with the same key results in the same cipher text. Use of an IV that is XORed with the first block of plain text solves this problem.

A.

CFB

B.

GOST

C.

ECB

D.

RC4

Question # 55

Which of the following uses an 80 bit key on 64 bit blocks?

A.

Skipjack

B.

Twofish

C.

DES

D.

AES

Question # 56

A technique used to increase the security of block ciphers. It consists of steps that combine the data with portions of the key (most commonly using a simple XOR) before the first round and after the last round of encryption.

A.

Whitening

B.

Key Exchange

C.

Key Schedule

D.

Key Clustering

Question # 57

If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?

A.

Alice ' s private key

B.

Bob ' s private key

C.

Alice ' s public key

D.

Bob ' s public key

Question # 58

With Cipher-block chaining (CBC) what happens?

A.

The block cipher is turned into a stream cipher

B.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

C.

Each block of plaintext is XORed with the previous ciphertext block before being encrypted

D.

The cipher text from the current round is XORed with the plaintext for the next round

Question # 59

Which of the following is the successor of SSL?

A.

GRE

B.

RSA

C.

IPSec

D.

TLS

Question # 60

Which one of the following are characteristics of a hash function? (Choose two)

A.

Requires a key

B.

One-way

C.

Fixed length output

D.

Symmetric

E.

Fast

Go to page: