EC-Council 212-81 EC-Council Certified Encryption Specialist (ECES) Online Training
EC-Council 212-81 Online Training
The questions for 212-81 were last updated at Dec 25,2024.
- Exam Code: 212-81
- Exam Name: EC-Council Certified Encryption Specialist (ECES)
- Certification Provider: EC-Council
- Latest update: Dec 25,2024
Jane is looking for an algorithm to ensure message integrity .
Which of following would be an acceptable choice?
- A . RSA
- B . AES
- C . RC4
- D . SHA-1
When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.
- A . Mersenne’s number
- B . Fermat’s number
- C . Euler’s totient
- D . Fermat’s prime
What is a variation of DES that uses a technique called Key Whitening?
- A . Blowfish
- B . DESX
- C . 3DES
- D . AES
Which algorithm implements an unbalanced Feistel cipher?
- A . Skipjack
- B . RSA
- C . 3DES
- D . Blowfish
What does the OCSP protocol provide?
- A . Revoked certificates
- B . Hashing
- C . VPN connectivity
- D . Encryption
A simple algorithm that will take the initial key and from that generate a slightly different key each round.
- A . Key Schedule
- B . Feistel Network
- C . SHA-2
- D . Diffie-Helman
You have been tasked with selecting a digital certificate standard for your company to use .
Which one of the following was an international standard for the format and information contained in a digital certificate?
- A . CA
- B . X.509
- C . CRL
- D . RFC 2298
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
- A . IPsec Policy Agent
- B . Internet Key Exchange (IKE)
- C . Oakley
- D . IPsec driver
You are explaining the details of the AES algorithm to cryptography students. You are discussing the derivation of the round keys from the shared symmetric key.
The portion of AES where round keys are derived from the cipher key using Rijndael’s key schedule is called what?
- A . The key expansion phase
- B . The round key phase
- C . The bit shifting phase
- D . The initial round