Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dealsixty

212-81 Exam Dumps - ECCouncil ECES Questions and Answers

Question # 44

Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.

Options:

A.

Keccak

B.

MD5

C.

SHA-1

D.

TIGER

Buy Now
Question # 45

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Options:

A.

WEP

B.

WEP2

C.

WPA

D.

WPA2

Buy Now
Question # 46

In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.

Options:

A.

Information deduction

B.

Total break

C.

Instance deduction

D.

Global deduction

Buy Now
Question # 47

Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?

Options:

A.

Block cipher

B.

Asymmetric

C.

Symmetric

D.

Stream cipher

Buy Now
Question # 48

Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.

Options:

A.

TIGER

B.

GOST

C.

BEAR

D.

FORK-256

Buy Now
Question # 49

A part of understanding symmetric cryptography understands the modes in which it can be used. You are

explaining those modes to a group of cryptography students. The most basic encryption mode is____________.

The message is divided into blocks, and each block is encrypted separately with no modification to the process.

Options:

A.

Cipher block chaining (CBC)

B.

Cipher feedback (CFB)

C.

Output feedback (OFB)

D.

Electronic codebook (ECB)

Buy Now
Question # 50

Which algorithm implements an unbalanced Feistel cipher?

Options:

A.

Skipjack

B.

RSA

C.

3DES

D.

Blowfish

Buy Now
Question # 51

Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?

Options:

A.

K4

B.

K5

C.

K3

D.

K2

E.

K1

Buy Now
Question # 52

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?

Options:

A.

Me mod n

B.

Ce mod n

C.

y2 = x3 + Ax + B

D.

P = Cd mod n

Buy Now
Question # 53

Which of the following is required for a hash?

Options:

A.

Not vulnerable to a brute force attack

B.

Few collisions

C.

Must use SALT

D.

Not reversible

E.

Variable length input, fixed length output

F.

Minimum key length

Buy Now
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Apr 8, 2025
Questions: 206
212-81 pdf

212-81 PDF

$34  $84.99
212-81 Engine

212-81 Testing Engine

$38  $94.99
212-81 PDF + Engine

212-81 PDF + Testing Engine

$54  $134.99