Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

EC-Council Certified Encryption Specialist (ECES)

Last Update 17 hours ago Total Questions : 206

The EC-Council Certified Encryption Specialist (ECES) content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include 212-81 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 212-81 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 212-81 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any EC-Council Certified Encryption Specialist (ECES) practice test comfortably within the allotted time.

Question # 4

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

A.

Key Schedule

B.

Feistel Network

C.

SHA-2

D.

Diffie-Helman

Question # 5

Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W. Kravitz, and adopted by the U. S. government in 1993 with FIPS 186?

A.

DSA

B.

AES

C.

RC4

D.

RSA

Question # 6

The ATBASH cipher is best described as what type of cipher?

A.

Asymmetric

B.

Symmetric

C.

Substitution

D.

Transposition

Question # 7

Widely used, particularly with Microsoft operating systems. Created by MIT and derives its name from the mythical three headed dog. The is a great deal of verification for the tickets and the tickets expire quickly. Client authenticates to the Authentication Server once using a long term shared secret and receives back a Ticket-Granting Server. Client can reuse this ticket to get additional tickets without reusing the shared secret. These tickets are used to prove authentication to the Service Server.

A.

Diffie-Hellman

B.

Yarrow

C.

Kerberos

D.

ElGamal

Question # 8

Symmetric algorithm. Designed by James Massey and Xuejia Lai. Operates on 64 bit blocks and has a 128 bit key. Consists of 8 identical transformations each round and an output transformation.

A.

IDEA

B.

RSA

C.

CAST

D.

DES

Question # 9

If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a " strong " pseudorandom permutation.

A.

15

B.

16

C.

3

D.

4

Question # 10

John is going to use RSA to encrypt a message to Joan. What key should he use?

A.

A random key

B.

Joan’s public key

C.

A shared key

D.

Joan’s private key

Go to page: