EC-Council 212-81 EC-Council Certified Encryption Specialist (ECES) Online Training
EC-Council 212-81 Online Training
The questions for 212-81 were last updated at Feb 19,2025.
- Exam Code: 212-81
- Exam Name: EC-Council Certified Encryption Specialist (ECES)
- Certification Provider: EC-Council
- Latest update: Feb 19,2025
Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?
- A . Cryptography
- B . Steganalysis
- C . Cryptology
- D . Steganography
The Clipper chip is notable in the history of cryptography for many reasons. First, it was designed for civilian used secure phones. Secondly, it was designed to use a very specific symmetric cipher .
Which one of the following was originally designed to provide built-in cryptography for the Clipper chip?
- A . Blowfish
- B . Twofish
- C . Skipjack
- D . Serpent
The most common way steganography is accomplished is via which one of the following?
- A . rsb
- B . Isb
- C . msb
- D . asb
In a Feistel cipher, the two halves of the block are swapped in each round .
What does this provide?
- A . Diffusion
- B . Confusion
- C . Avalanche
- D . Substitution
The most widely used asymmetric encryption algorithm is what?
- A . Vigenere
- B . Caesar Cipher
- C . RSA
- D . DES
A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
- A . Digital Signature
- B . Hash
- C . Ownership stamp
- D . Digest
Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.
- A . Keccak
- B . MD5
- C . SHA-1
- D . TIGER
Which of the following is a protocol for exchanging keys?
- A . DH
- B . EC
- C . AES
- D . RSA
In 1977 researchers and MIT described what asymmetric algorithm?
- A . DH
- B . RSA
- C . AES
- D . EC