Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

212-81 ECCouncil EC-Council Certified Encryption Specialist (ECES) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ECCouncil 212-81 EC-Council Certified Encryption Specialist (ECES) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 4
Total 206 questions

How many qubits are needed to break RSA?

A.

1000

B.

2000

C.

4000

D.

100

Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

A.

IPsec Policy Agent

B.

Internet Key Exchange (IKE)

C.

Oakley

D.

IPsec driver

Which of the following would be the fastest.

A.

EC

B.

DH

C.

RSA

D.

AES

The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).

A.

Odd numbers

B.

Fibonacci Sequence

C.

Fermat pseudoprime

D.

Prime numbers

Which of the following algorithms uses three different keys to encrypt the plain text?

A.

Skipjack

B.

AES

C.

Blowfish

D.

3DES

Bob’s password is hashed, and so is John’s. Even though they used different passwords, the hash is the same. What is this called?

A.

A collision

B.

A mistake

C.

Convergence

D.

Transposition

What is a "Collision attack" in cryptography?

A.

Collision attacks try to break the hash into three parts to get the plaintext value

B.

Collision attacks try to get the public key

C.

Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key

D.

Collision attacks try to find two inputs producing the same

MD5 can best be described as which one of the following?

A.

Asymmetric algorithm

B.

Hashing algorithm

C.

Digital signature

D.

Symmetric algorithm

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

A.

128 bit and CRC

B.

128 bi and TKIP

C.

128 bit and CCMP

D.

64 bit and CCMP

Which one of the following uses three different keys, all of the same size?

A.

3DES

B.

AES

C.

RSA

D.

DES

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

A.

Key distribution

B.

Security

C.

Scalability

D.

Speed

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.

A.

Rail Fence Cipher

B.

Null Cipher

C.

Vigenere Cipher

D.

ROT-13

You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?

A.

CA

B.

X.509

C.

CRL

D.

RFC 2298

Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?

A.

Caesar cipher

B.

RSA

C.

PGP

D.

DES

A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.

A.

ADFVGX Cipher

B.

ROT13 Cipher

C.

Book Ciphers

D.

Cipher Disk

Storing private keys with a third party is referred to as what?

A.

Key caching

B.

Key storage

C.

Key banking

D.

Key escrow

How did the ATBASH cipher work?

A.

By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.)

B.

By rotating text a given number of spaces

C.

By Multi alphabet substitution

D.

By shifting each letter a certain number of spaces

What is an IV?

A.

Random bits added to a hash

B.

The key used for a cryptography algorith

C.

A fixed size random stream that is added to a block cipher to increase randomeness

D.

The cipher used

A ______ refers to a situation where two different inputs yield the same output.

A.

Convergence

B.

Collision

C.

Transposition

D.

Substitution

In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed

A.

Vector

B.

Salt

C.

Stream

D.

IV

Page: 3 / 4
Total 206 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved