Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

212-81 Exam Dumps - ECCouncil ECES Questions and Answers

Question # 34

What is the basis for the FISH algorithm?

Options:

A.

The Lagged Fibonacci generator

B.

Prime number theory

C.

Equations that describe an ellipse

D.

The difficulty in factoring numbers

Buy Now
Question # 35

Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 ≤ Xi ≤ m.

Options:

A.

Lehmer Random Number Generator

B.

Lagged Fibonacci Generator

C.

Linear Congruential Generator

D.

Blum Blum Shub

Buy Now
Question # 36

Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?

Options:

A.

PIKE

B.

Twofish

C.

RC4

D.

Blowfish

Buy Now
Question # 37

What does Output feedback (OFB) do:

Options:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

A block cipher is converted into a stream cipher by generating a keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext

D.

The cipher text from the current round is XORed with the plaintext for the next round

Buy Now
Question # 38

The greatest weakness with symmetric algorithms is _____.

Options:

A.

They are less secure than asymmetric

B.

The problem of key exchange

C.

The problem of generating keys

D.

They are slower than asymmetric

Buy Now
Question # 39

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

Options:

A.

PKI

B.

DES

C.

RSA

D.

Diffie-Helmann

Buy Now
Question # 40

With Electronic codebook (ECB) what happens:

Options:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

The block cipher is turned into a stream cipher

D.

The cipher text from the current round is XORed with the plaintext for the next round

Buy Now
Question # 41

Which of the following techniques is used (other than brute force) to attempt to derive a key?

Options:

A.

Cryptography

B.

Cryptoanalysis

C.

Password cracking

D.

Hacking

Buy Now
Question # 42

Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.

Options:

A.

Certificate Authority

B.

Raw Quick Pair

C.

Chi-Square Analysis

D.

SP network

Buy Now
Question # 43

John is going to use RSA to encrypt a message to Joan. What key should he use?

Options:

A.

A random key

B.

Joan’s public key

C.

A shared key

D.

Joan’s private key

Buy Now
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Feb 23, 2025
Questions: 206
212-81 pdf

212-81 PDF

$25.5  $84.99
212-81 Engine

212-81 Testing Engine

$28.5  $94.99
212-81 PDF + Engine

212-81 PDF + Testing Engine

$40.5  $134.99