Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

212-81 Exam Dumps - ECCouncil ECES Questions and Answers

Question # 14

What type of encryption uses different keys to encrypt and decrypt the message?

Options:

A.

Asymmetric

B.

Symmetric

C.

Secure

D.

Private key

Buy Now
Question # 15

John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)

Options:

A.

Encrypt mode

B.

Transport mode

C.

Tunnel mode

D.

Decrypt mode

Buy Now
Question # 16

What is the formula m^e %n related to?

Options:

A.

Encrypting with EC

B.

Decrypting with RSA

C.

Generating Mersenne primes

D.

Encrypting with RSA

Buy Now
Question # 17

Ahlen is using a set of pre-calculated hashes to attempt to derive the passwords from a Windows SAM file. What is a set of pre-calculated hashes used to derive a hashed password called?

Options:

A.

Hash matrix

B.

Rainbow table

C.

Password table

D.

Hash table

Buy Now
Question # 18

Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?

Options:

A.

160

B.

512

C.

256

D.

128

Buy Now
Question # 19

In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).

Options:

A.

Carrier

B.

Signal

C.

Payload

D.

Channel

Buy Now
Question # 20

Which one of the following are characteristics of a hash function? (Choose two)

Options:

A.

Requires a key

B.

One-way

C.

Fixed length output

D.

Symmetric

E.

Fast

Buy Now
Question # 21

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.

Options:

A.

Rail Fence Cipher

B.

Null Cipher

C.

Vigenere Cipher

D.

ROT-13

Buy Now
Question # 22

Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?

Options:

A.

Differential Analysis

B.

Discrete Cosine Transform

C.

Raw Quick Pair

D.

Chi squared analysis

Buy Now
Question # 23

Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Options:

A.

WEP2

B.

WPA

C.

WEP

D.

WPA2

Buy Now
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Apr 2, 2025
Questions: 206
212-81 pdf

212-81 PDF

$25.5  $84.99
212-81 Engine

212-81 Testing Engine

$28.5  $94.99
212-81 PDF + Engine

212-81 PDF + Testing Engine

$40.5  $134.99