Exam Details

  • Exam Code
    :212-81
  • Exam Name
    :EC-Council Certified Encryption Specialist (ECES)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :206 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 212-81 Questions & Answers

  • Question 91:

    This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.

    A. SHA-256

    B. FORK-256

    C. SHA-1

    D. RSA

  • Question 92:

    Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

    A. WEP

    B. WEP2

    C. WPA

    D. WPA2

  • Question 93:

    What is a "Collision attack" in cryptography?

    A. Collision attacks try to break the hash into three parts to get the plaintext value

    B. Collision attacks try to get the public key

    C. Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key

    D. Collision attacks try to find two inputs producing the same

  • Question 94:

    Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?

    A. 160

    B. 512

    C. 256

    D. 128

  • Question 95:

    Changes to one character in the plain text affect multiple characters in the cipher text, unlike in historical algorithms where each plain text character only affect one cipher text character.

    A. Substitution

    B. Avalanche

    C. Confusion

    D. Diffusion

  • Question 96:

    An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.

    A. CHAP

    B. SPAP

    C. PAP

    D. EAP

  • Question 97:

    The ATBASH cipher is best described as what type of cipher?

    A. Asymmetric

    B. Symmetric

    C. Substitution D. Transposition

  • Question 98:

    A number that is used only one time, then discarded is called what?

    A. IV

    B. Nonce

    C. Chain

    D. Salt

  • Question 99:

    Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.

    A. TIGER

    B. GOST

    C. BEAR

    D. FORK-256

  • Question 100:

    What is an IV?

    A. Random bits added to a hash

    B. The key used for a cryptography algorith

    C. A fixed size random stream that is added to a block cipher to increase randomeness

    D. The cipher used

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-81 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.