Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

212-81 Exam Dumps - ECCouncil ECES Questions and Answers

Question # 54

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

Options:

A.

Key distribution

B.

Security

C.

Scalability

D.

Speed

Buy Now
Question # 55

What size block does AES work on?

Options:

A.

64

B.

128

C.

192

D.

256

Buy Now
Question # 56

Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?

Options:

A.

WEP

B.

WPA

C.

WPA2

D.

TKIP

Buy Now
Question # 57

An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.

Options:

A.

Differential Cryptanalysis

B.

Linear Cryptanalysis

C.

Chosen Plaintext Attack

D.

Integral Cryptanalysis

Buy Now
Question # 58

Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?

Options:

A.

Caesar cipher

B.

RSA

C.

PGP

D.

DES

Buy Now
Question # 59

If you XOR 10111000 with 10101010, what is the result?

Options:

A.

10111010

B.

10101010

C.

11101101

D.

00010010

Buy Now
Question # 60

If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.

Options:

A.

15

B.

16

C.

3

D.

4

Buy Now
Question # 61

Which of the following statements is most true regarding binary operations and encryption?

Options:

A.

They can provide secure encryption

B.

They are only useful as a teaching method

C.

They can form a part of viable encryption methods

D.

They are completely useless

Buy Now
Question # 62

Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and CA. Receives request, authenticates it and forwards it to the CA.

Options:

A.

PKI (Public Key Infrastructure)

B.

TTP (Trusted Third Party)

C.

RA (Registration Authority)

D.

CP (Certificate Policy)

Buy Now
Question # 63

Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?

Options:

A.

Pegasus

B.

Blowfish

C.

SHA1

D.

AES

Buy Now
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Feb 23, 2025
Questions: 206
212-81 pdf

212-81 PDF

$25.5  $84.99
212-81 Engine

212-81 Testing Engine

$28.5  $94.99
212-81 PDF + Engine

212-81 PDF + Testing Engine

$40.5  $134.99