EC-Council 212-81 EC-Council Certified Encryption Specialist (ECES) Online Training
EC-Council 212-81 Online Training
The questions for 212-81 were last updated at Feb 18,2025.
- Exam Code: 212-81
- Exam Name: EC-Council Certified Encryption Specialist (ECES)
- Certification Provider: EC-Council
- Latest update: Feb 18,2025
Which one of the following are characteristics of a hash function? (Choose two)
- A . Requires a key
- B . One-way
- C . Fixed length output
- D . Symmetric
- E . Fast
Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?
- A . Differential Analysis
- B . Discrete Cosine Transform
- C . Raw Quick Pair
- D . Chi squared analysis
Which service in a PKI will vouch for the identity of an individual or company?
- A . CA
- B . CR
- C . KDC
- D . CBC
Which of the following is required for a hash?
- A . Not vulnerable to a brute force attack
- B . Few collisions
- C . Must use SALT
- D . Not reversible
- E . Variable length input, fixed length output
- F . Minimum key length
Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 Xi m.
- A . Lehmer Random Number Generator
- B . Lagged Fibonacci Generator
- C . Linear Congruential Generator
- D . Blum Blum Shub
Which one of the following is a component of the PKI?
- A . CA
- B . TGS
- C . OCSP
- D . TGT
Frank is trying to break into an encrypted file… He is attempting all the possible keys that could be used for this algorithm.
Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?
- A . Rainbow table
- B . Frequency analysis
- C . Brute force
- D . Kasiski
Which one of the following best describes a process that splits the block of plaintext into two separate blocks, then applies the round function to one half, and finally swaps the two halves?
- A . Block ciphers
- B . Symmetric cryptography
- C . Feistel cipher
- D . Substitution cipher
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
- A . Feistel
- B . Asymmetric cipher
- C . Symmetric cipher
- D . Hash
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important.
If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?
- A . Complete diffusion
- B . Complete scrambling
- C . Complete confusion
- D . Complete avalanche