Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

212-81 Exam Dumps - EC-Council Certified Encryption Specialist (ECES)

Searching for workable clues to ace the ECCouncil 212-81 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 212-81 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 41

John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)

A.

Encrypt mode

B.

Transport mode

C.

Tunnel mode

D.

Decrypt mode

Full Access
Question # 42

Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186

A.

AES

B.

RC4

C.

DSA

D.

RSA

Full Access
Question # 43

Which one of the following is a component of the PKI?

A.

CA

B.

TGS

C.

OCSP

D.

TGT

Full Access
Question # 44

Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 ≤ Xi ≤ m.

A.

Lehmer Random Number Generator

B.

Lagged Fibonacci Generator

C.

Linear Congruential Generator

D.

Blum Blum Shub

Full Access
Question # 45

A real time protocol for verifying certificates (and a newer method than CRL).

A.

Online Certificate Status Protocol (OCSP)

B.

Server-based Certificate Validation Protocol (SCVP)

C.

Public Key Infrastructure (PKI)

D.

Registration Authority (RA)

Full Access
Question # 46

What is the basis for the difficulty in breaking RSA?

A.

Hashing

B.

The birthday paradox

C.

Equations that describe an elliptic curve

D.

Factoring numbers

Full Access
Question # 47

This is a proprietary version of PAP. Encrypts username and password as it is sent across network.

A.

PPTP VPN

B.

S-PAP

C.

Kerberos

D.

WPA2

Full Access
Question # 48

Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.

A.

Certificate Authority

B.

Raw Quick Pair

C.

Chi-Square Analysis

D.

SP network

Full Access
Go to page: