Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

212-81 Exam Dumps - EC-Council Certified Encryption Specialist (ECES)

Searching for workable clues to ace the ECCouncil 212-81 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 212-81 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.

A.

Scytale Cipher

B.

Playfair Cipher

C.

Homophonic Substitution

D.

ADFVGX Cipher

Full Access
Question # 10

What size key does Skipjack use?

A.

128 bit

B.

56 bit

C.

80 bit

D.

256 bit

Full Access
Question # 11

When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.

A.

Mersenne's number

B.

Fermat's number

C.

Euler's totient

D.

Fermat's prime

Full Access
Question # 12

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

A.

PKI

B.

DES

C.

RSA

D.

Diffie-Helmann

Full Access
Question # 13

_____ uses at least two different shifts, changing the shift with different letters in the plain text.

A.

Caesar cipher

B.

multi-alphabet encryption

C.

Scytale

D.

Atbash

Full Access
Question # 14

Which of the following would be the fastest.

A.

EC

B.

DH

C.

RSA

D.

AES

Full Access
Question # 15

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access 2 (WPA2)

C.

Wi-Fi Protected Access (WPA)

D.

Temporal Key Integrity Protocol (TKIP)

Full Access
Question # 16

What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?

A.

Chosen plaintext

B.

Differential cryptanalysis

C.

Known-plaintext attack

D.

Kasiski examination

Full Access
Go to page: