Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

212-81 ECCouncil EC-Council Certified Encryption Specialist (ECES) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ECCouncil 212-81 EC-Council Certified Encryption Specialist (ECES) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 4
Total 206 questions

Which of the following uses an 80 bit key on 64 bit blocks?

A.

Skipjack

B.

Twofish

C.

DES

D.

AES

With Cipher feedback (CFB) what happens?

A.

The key is reapplied

B.

The ciphertext block is encrypted then the ciphertext produced is XOR’d back with the plaintext to produce the current ciphertext block

C.

The block cipher is turned into a stream cipher

D.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

A disk you rotated to encrypt/decrypt. Created by Leon Alberti. Similar technologies were used in the Enigma machine. Considered the forefather of modern encryption.

A.

Chi Square

B.

Enigma Machine

C.

Cipher Disks

D.

Scytale Cipher

When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.

A.

Mersenne's number

B.

Fermat's number

C.

Euler's totient

D.

Fermat's prime

A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.

A.

Registration Authority

B.

Payload

C.

OCSP

D.

Digital Certificate

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

A.

SHA-0

B.

SHA-2

C.

SHA-1

D.

SHA-3

RFC 1321 describes what hash?

A.

RIPEMD

B.

GOST

C.

SHA1

D.

MD5

The reverse process from encoding - converting the encoded message back into its plaintext format.

A.

Substitution

B.

Whitening

C.

Encoding

D.

Decoding

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

A.

SHA1

B.

SHA-256

C.

RSA

D.

MD5

Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?

A.

Differential Analysis

B.

Discrete Cosine Transform

C.

Raw Quick Pair

D.

Chi squared analysis

Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?

A.

Complete diffusion

B.

Complete scrambling

C.

Complete confusion

D.

Complete avalanche

A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.

A.

Total Break

B.

Distinguishing Algorithm

C.

Instance Deduction

D.

Information Deduction

Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm.

A.

Blowfish

B.

Rijndael

C.

Lucifer

D.

El Gamal

This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.

A.

RC4

B.

Blowfish

C.

Twofish

D.

FISH

Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186

A.

AES

B.

RC4

C.

DSA

D.

RSA

Changes to one character in the plain text affect multiple characters in the cipher text, unlike in historical algorithms where each plain text character only affect one cipher text character.

A.

Substitution

B.

Avalanche

C.

Confusion

D.

Diffusion

Which algorithm implements an unbalanced Feistel cipher?

A.

Skipjack

B.

RSA

C.

3DES

D.

Blowfish

The time and effort required to break a security measure.

A.

Session Key

B.

Work factor

C.

Non-repudiation

D.

Payload

All of the following are key exchange protocols except for____

A.

MQV

B.

AES

C.

ECDH

D.

DH

An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.

A.

CHAP

B.

SPAP

C.

PAP

D.

EAP

Page: 1 / 4
Total 206 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved