Exam Details

  • Exam Code
    :212-81
  • Exam Name
    :EC-Council Certified Encryption Specialist (ECES)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :206 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 212-81 Questions & Answers

  • Question 21:

    The most common way steganography is accomplished is via which one of the following?

    A. rsb

    B. Isb

    C. msb

    D. asb

  • Question 22:

    A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.

    A. Total Break

    B. Distinguishing Algorithm

    C. Instance Deduction

    D. Information Deduction

  • Question 23:

    Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?

    A. Cryptography

    B. Steganalysis

    C. Cryptology

    D. Steganography

  • Question 24:

    The Clipper chip is notable in the history of cryptography for many reasons. First, it was designed for civilian used secure phones. Secondly, it was designed to use a very specific symmetric cipher. Which one of the following was originally designed to provide built-in cryptography for the Clipper chip?

    A. Blowfish

    B. Twofish

    C. Skipjack

    D. Serpent

  • Question 25:

    Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

    A. SHA2

    B. MD5

    C. MD4

    D. PIKE

  • Question 26:

    If you wished to see a list of revoked certificates from a CA, where would you look?

    A. RA

    B. RFC

    C. CRL

    D. CA

  • Question 27:

    Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?

    A. K4

    B. K5

    C. K3

    D. K2

    E. K1

  • Question 28:

    Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

    A. Key distribution

    B. Security

    C. Scalability

    D. Speed

  • Question 29:

    During the process of encryption and decryption, what keys are shared?

    A. Public keys

    B. Public and private keys

    C. User passwords

    D. Private keys

  • Question 30:

    Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.

    A. Cipher disk

    B. Caesar cipher

    C. Scytale

    D. Enigma machine

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-81 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.