Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

212-81 Exam Dumps - EC-Council Certified Encryption Specialist (ECES)

Searching for workable clues to ace the ECCouncil 212-81 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 212-81 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 49

Storing private keys with a third party is referred to as what?

A.

Key caching

B.

Key storage

C.

Key banking

D.

Key escrow

Full Access
Question # 50

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

A.

SHA-0

B.

SHA-2

C.

SHA-1

D.

SHA-3

Full Access
Question # 51

A non-secret binary vector used as the initializing input algorithm for encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.

A.

IV

B.

Salt

C.

L2TP

D.

Nonce

Full Access
Question # 52

Ahlen is using a set of pre-calculated hashes to attempt to derive the passwords from a Windows SAM file. What is a set of pre-calculated hashes used to derive a hashed password called?

A.

Hash matrix

B.

Rainbow table

C.

Password table

D.

Hash table

Full Access
Question # 53

Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.

A.

VPN

B.

PGP

C.

Cryptool

D.

VeraCrypt

Full Access
Question # 54

If the round function is a cryptographically secure pseudorandom function, then ___________ rounds is sufficient to make the block cipher a pseudorandom permutation.

A.

2

B.

15

C.

16

D.

3

Full Access
Question # 55

Which one of the following is a symmetric key system using 64-bit blocks?

A.

DES

B.

PGP

C.

DSA

D.

RSA

Full Access
Question # 56

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?

A.

Me mod n

B.

Ce mod n

C.

y2 = x3 + Ax + B

D.

P = Cd mod n

Full Access
Go to page: