Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

212-81 Exam Dumps - ECCouncil ECES Questions and Answers

Question # 4

With Cipher-block chaining (CBC) what happens?

Options:

A.

The block cipher is turned into a stream cipher

B.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

C.

Each block of plaintext is XORed with the previous ciphertext block before being encrypted

D.

The cipher text from the current round is XORed with the plaintext for the next round

Buy Now
Question # 5

Which of the following is a protocol for exchanging keys?

Options:

A.

DH

B.

EC

C.

AES

D.

RSA

Buy Now
Question # 6

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Options:

A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access 2 (WPA2)

C.

Wi-Fi Protected Access (WPA)

D.

Temporal Key Integrity Protocol (TKIP)

Buy Now
Question # 7

The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.

Options:

A.

ElGamal

B.

RSA

C.

PAP

D.

X.509

Buy Now
Question # 8

What advantage do symmetric algorithms have over asymmetric algorithms

Options:

A.

It is easier to implement them in software

B.

They are more secure

C.

They are faster

D It is easier to exchange keys

Buy Now
Question # 9

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?

Options:

A.

Complete diffusion

B.

Complete scrambling

C.

Complete confusion

D.

Complete avalanche

Buy Now
Question # 10

Bob’s password is hashed, and so is John’s. Even though they used different passwords, the hash is the same. What is this called?

Options:

A.

A collision

B.

A mistake

C.

Convergence

D.

Transposition

Buy Now
Question # 11

The ATBASH cipher is best described as what type of cipher?

Options:

A.

Asymmetric

B.

Symmetric

C.

Substitution

D.

Transposition

Buy Now
Question # 12

A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.

Options:

A.

Registration Authority

B.

Payload

C.

OCSP

D.

Digital Certificate

Buy Now
Question # 13

How does Kerberos generate the first secret key in the authentication process?

Options:

A.

By generating a random AES key

B.

By creating a hash of the user password

C.

By hashing the user ID, network ID. and salt

D.

By using the user's public key

Buy Now
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Feb 22, 2025
Questions: 206
212-81 pdf

212-81 PDF

$25.5  $84.99
212-81 Engine

212-81 Testing Engine

$28.5  $94.99
212-81 PDF + Engine

212-81 PDF + Testing Engine

$40.5  $134.99