Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

212-81 EC-Council Certified Encryption Specialist (ECES) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

212-81 Practice Questions

EC-Council Certified Encryption Specialist (ECES)

Last Update 4 hours ago
Total Questions : 206

Dive into our fully updated and stable 212-81 practice test platform, featuring all the latest ECES exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free ECES practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 212-81. Use this test to pinpoint which areas you need to focus your study on.

212-81 PDF

212-81 PDF (Printable)
$43.75
$124.99

212-81 Testing Engine

212-81 PDF (Printable)
$50.75
$144.99

212-81 PDF + Testing Engine

212-81 PDF (Printable)
$63.7
$181.99
Question # 11

What is the largest key size that AES can use?

Options:

A.  

256

B.  

56

C.  

512

D.  

128

Discussion 0
Question # 12

What type of encryption uses different keys to encrypt and decrypt the message?

Options:

A.  

Asymmetric

B.  

Symmetric

C.  

Secure

D.  

Private key

Discussion 0
Question # 13

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

Options:

A.  

SHA-0

B.  

SHA-2

C.  

SHA-1

D.  

SHA-3

Discussion 0
Question # 14

What is Kerchoff's principle?

Options:

A.  

A minimum of 15 rounds is needed for a Feistel cipher to be secure

B.  

Only the key needs to be secret, not the actual algorithm

C.  

Both algorithm and key should be kept secret

D.  

A minimum key size of 256 bits is necessary for security

Discussion 0
Question # 15

A non-secret binary vector used as the initializing input algorithm for encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.

Options:

A.  

IV

B.  

Salt

C.  

L2TP

D.  

Nonce

Discussion 0
Question # 16

With Cipher feedback (CFB) what happens?

Options:

A.  

The key is reapplied

B.  

The ciphertext block is encrypted then the ciphertext produced is XOR’d back with the plaintext to produce the current ciphertext block

C.  

The block cipher is turned into a stream cipher

D.  

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

Discussion 0
Question # 17

Which of the following is an asymmetric algorithm related to the equation y^2 = x^3 + Ax + B?

Options:

A.  

Blowfish

B.  

Elliptic Curve

C.  

AES

D.  

RSA

Discussion 0
Question # 18

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

Options:

A.  

IPsec Policy Agent

B.  

Internet Key Exchange (IKE)

C.  

Oakley

D.  

IPsec driver

Discussion 0
Question # 19

Which one of the following is an authentication method that sends the username and password in cleartext?

Options:

A.  

PAP

B.  

CHAP

C.  

Kerberos

D.  

SPAP

Discussion 0
Question # 20

The mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.

Options:

A.  

Cipher-block chaining (CBC)

B.  

Electronic codebook (ECB)

C.  

Output feedback (OFB)

D.  

Cipher feedback (CFB)

Discussion 0
Get 212-81 dumps and pass your exam in 24 hours!

Free Exams Sample Questions