Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

212-81 ECCouncil EC-Council Certified Encryption Specialist (ECES) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ECCouncil 212-81 EC-Council Certified Encryption Specialist (ECES) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 4
Total 206 questions

Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?

A.

PIKE

B.

Twofish

C.

RC4

D.

Blowfish

In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?

A.

IPSec does not involve gateways

B.

Only transport mode can be used

C.

Encapsulating Security Payload (ESP) authentication must be used

D.

Only the tunnel mode can be used

An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.

A.

Differential Cryptanalysis

B.

Linear Cryptanalysis

C.

Chosen Plaintext Attack

D.

Integral Cryptanalysis

Which of the following equations is related to EC?

A.

P = Cd%n

B.

Me%n

C.

y^2 = x^3 + Ax + B

D.

Let m = (p-1)(q-1)

Which of the following would be the weakest encryption algorithm?

A.

DES

B.

AES

C.

RSA

D.

EC

You are studying classic ciphers. You have been examining the difference between single substitution and multi-substitution. Which one of the following is an example of a multi-alphabet cipher?

A.

Rot13

B.

Caesar

C.

Atbash

D.

Vigenère

How can rainbow tables be defeated?

A.

Lockout accounts under brute force password cracking attempts

B.

All uppercase character passwords

C.

Use of non-dictionary words

D.

Password salting

What is Kerchoff's principle?

A.

A minimum of 15 rounds is needed for a Feistel cipher to be secure

B.

Only the key needs to be secret, not the actual algorithm

C.

Both algorithm and key should be kept secret

D.

A minimum key size of 256 bits is necessary for security

What is a salt?

A.

Key whitening

B.

Random bits intermixed with a symmetric cipher to increase randomness and make it more secure

C.

Key rotation

D.

Random bits intermixed with a hash to increase randomness and reduce collisions

With Cipher-block chaining (CBC) what happens?

A.

The block cipher is turned into a stream cipher

B.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

C.

Each block of plaintext is XORed with the previous ciphertext block before being encrypted

D.

The cipher text from the current round is XORed with the plaintext for the next round

What must occur in order for a cipher to be considered ‘broken’?

A.

Uncovering the algorithm used

B.

Decoding the key

C.

Finding any method that is more efficient than brute force

D.

Rendering the cipher no longer useable

A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used to try to discover patterns and use that information to decrypt the cipher.

A.

Kasiski Method

B.

Birthday Attack

C.

Information Deduction

D.

Integral Cryptanalysis

Which of the following is an asymmetric algorithm that was first publically described in 1977?

A.

Elliptic Curve

B.

Twofish

C.

DESX

D.

RSA

A measure of the uncertainty associated with a random variable.

A.

Collision

B.

Whitening

C.

Diffusion

D.

Entropy

Widely used, particularly with Microsoft operating systems. Created by MIT and derives its name from the mythical three headed dog. The is a great deal of verification for the tickets and the tickets expire quickly. Client authenticates to the Authentication Server once using a long term shared secret and receives back a Ticket-Granting Server. Client can reuse this ticket to get additional tickets without reusing the shared secret. These tickets are used to prove authentication to the Service Server.

A.

Diffie-Hellman

B.

Yarrow

C.

Kerberos

D.

ElGamal

A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.

A.

Chosen Plaintext Attack

B.

Steganography

C.

Rainbow Tables

D.

Transposition

Numbers that have no factors in common with another.

A.

Fibonacci Numbers

B.

Even Numbers

C.

Co-prime numbers

D.

Mersenne Primes

Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.

A.

VPN

B.

PGP

C.

Cryptool

D.

VeraCrypt

What type of encryption uses different keys to encrypt and decrypt the message?

A.

Asymmetric

B.

Symmetric

C.

Secure

D.

Private key

A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.

A.

Blum Blum Shub

B.

Elliptic Curve

C.

Menezes-Qu-Vanstone

D.

Euler's totient

Page: 2 / 4
Total 206 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved