Exam Details

  • Exam Code
    :212-81
  • Exam Name
    :EC-Council Certified Encryption Specialist (ECES)
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :206 Q&As
  • Last Updated
    :Apr 12, 2025

EC-COUNCIL EC-COUNCIL Certifications 212-81 Questions & Answers

  • Question 71:

    Which of the following algorithms uses three different keys to encrypt the plain text?

    A. Skipjack

    B. AES

    C. Blowfish

    D. 3DES

  • Question 72:

    Encryption of the same plain text with the same key results in the same cipher text. Use of an IV that is XORed with the first block of plain text solves this problem.

    A. CFB

    B. GOST

    C. ECB

    D. RC4

  • Question 73:

    A non-secret binary vector used as the initializing input algorithm for encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.

    A. IV

    B. Salt

    C. L2TP

    D. Nonce

  • Question 74:

    What is Kerchoff's principle?

    A. A minimum of 15 rounds is needed for a Feistel cipher to be secure

    B. Only the key needs to be secret, not the actual algorithm

    C. Both algorithm and key should be kept secret

    D. A minimum key size of 256 bits is necessary for security

  • Question 75:

    What size block does AES work on?

    A. 64

    B. 128

    C. 192

    D. 256

  • Question 76:

    Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?

    A. Block cipher

    B. Asymmetric

    C. Symmetric

    D. Stream cipher

  • Question 77:

    The reverse process from encoding - converting the encoded message back into its plaintext format.

    A. Substitution

    B. Whitening

    C. Encoding

    D. Decoding

  • Question 78:

    Which of the following are valid key sizes for AES (Choose three)?

    A. 192

    B. 56

    C. 256

    D. 128

    E. 512

    F. 64

  • Question 79:

    In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

    Which Algorithm is this referring to?

    A. Wired Equivalent Privacy (WEP)

    B. Wi-Fi Protected Access 2 (WPA2)

    C. Wi-Fi Protected Access (WPA)

    D. Temporal Key Integrity Protocol (TKIP)

  • Question 80:

    Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and CA. Receives request, authenticates it and forwards it to the CA.

    A. PKI (Public Key Infrastructure)

    B. TTP (Trusted Third Party)

    C. RA (Registration Authority)

    D. CP (Certificate Policy)

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-81 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.