New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Complete 212-81 ECCouncil Materials

Page: 7 / 15
Question 28

The ATBASH cipher is best described as what type of cipher?

Options:

A.

Asymmetric

B.

Symmetric

C.

Substitution

D.

Transposition

Question 29

What advantage do symmetric algorithms have over asymmetric algorithms

Options:

A.

It is easier to implement them in software

B.

They are more secure

C.

They are faster

D It is easier to exchange keys

Question 30

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Options:

A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access 2 (WPA2)

C.

Wi-Fi Protected Access (WPA)

D.

Temporal Key Integrity Protocol (TKIP)

Question 31

The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.

Options:

A.

ElGamal

B.

RSA

C.

PAP

D.

X.509

Page: 7 / 15
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Dec 22, 2024
Questions: 206
212-81 pdf

212-81 PDF

$25.5  $84.99
212-81 Engine

212-81 Testing Engine

$28.5  $94.99
212-81 PDF + Engine

212-81 PDF + Testing Engine

$40.5  $134.99