EC-Council 212-81 EC-Council Certified Encryption Specialist (ECES) Online Training
EC-Council 212-81 Online Training
The questions for 212-81 were last updated at Feb 19,2025.
- Exam Code: 212-81
- Exam Name: EC-Council Certified Encryption Specialist (ECES)
- Certification Provider: EC-Council
- Latest update: Feb 19,2025
What best describes the shifting of each letter a fixed number of spaces to the left or right?
- A . Single substitution
- B . Multi substitution
- C . XOR
- D . Bit shifting
Which of the following is generally true about key sizes?
- A . Larger key sizes increase security
- B . Key size is irrelevant to security
- C . Key sizes must be more than 256 bits to be secure
- D . Smaller key sizes increase security
Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?
- A . PIKE
- B . Twofish
- C . RC4
- D . Blowfish
Which of the following is the standard for digital certificates?
- A . RFC 2298
- B . X.509
- C . CRL
- D . CA
A type of frequency analysis used to attack polyalphabetic substitution ciphers. It’s used to try to discover patterns and use that information to decrypt the cipher.
- A . Kasiski Method
- B . Birthday Attack
- C . Information Deduction
- D . Integral Cryptanalysis
WPA2 uses AES for wireless data encryption at which of the following encryption levels?
- A . 128 bit and CRC
- B . 128 bi and TKIP
- C . 128 bit and CCMP
- D . 64 bit and CCMP
Original, unencrypted information is referred to as ____.
- A . text
- B . plaintext
- C . ciphertext
- D . cleartext
What is the basis for the FISH algorithm?
- A . The Lagged Fibonacci generator
- B . Prime number theory
- C . Equations that describe an ellipse
- D . The difficulty in factoring numbers