Certbus > EC-COUNCIL > EC-COUNCIL Certifications > 212-81 > 212-81 Online Practice Questions and Answers

212-81 Online Practice Questions and Answers

Questions 4

What size block does AES work on?

A. 64

B. 128

C. 192

D. 256

Browse 206 Q&As
Questions 5

Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?

A. RSA

B. AES

C. RC4

D. SHA-1

Browse 206 Q&As
Questions 6

You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?

A. CA

B. X.509

C. CRL

D. RFC 2298

Browse 206 Q&As
Questions 7

What best describes the shifting of each letter a fixed number of spaces to the left or right?

A. Single substitution

B. Multi substitution

C. XOR

D. Bit shifting

Browse 206 Q&As
Questions 8

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

A. Key distribution

B. Security

C. Scalability

D. Speed

Browse 206 Q&As
Questions 9

Uses a formula, M_n = 2^n 1 where n is a prime number, to generate primes. Works for 2, 3, 5, 7 but fails on 11 and on many other n values.

A. Fibonacci Numbers

B. Co-prime Numbers

C. Even Numbers

D. Mersenne Primes

Browse 206 Q&As
Questions 10

Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.

A. Key

B. IV

C. Chain

D. Salt

Browse 206 Q&As
Questions 11

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

A. Skipjack

B. Blowfish

C. MD5

D. Serpent

Browse 206 Q&As
Questions 12

Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.

A. Scytale Cipher

B. Playfair Cipher

C. Homophonic Substitution

D. ADFVGX Cipher

Browse 206 Q&As
Questions 13

A technique used to increase the security of block ciphers. It consists of steps that combine the data with portions of the key (most commonly using a simple XOR) before the first round and after the last round of encryption.

A. Whitening

B. Key Exchange

C. Key Schedule

D. Key Clustering

Browse 206 Q&As
Questions 14

Which of the following is an asymmetric cipher?

A. RSA

B. AES

C. DES

D. RC4

Browse 206 Q&As
Questions 15

Developed by Netscape and has been replaced by TLS. It was the preferred method used with secure websites.

A. OCSP

B. VPN

C. CRL

D. SSL

Browse 206 Q&As
Questions 16

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

A. PKI

B. DES

C. RSA

D. Diffie-Helmann

Browse 206 Q&As
Questions 17

If you XOR 10111000 with 10101010, what is the result?

A. 10111010

B. 10101010

C. 11101101

D. 00010010

Browse 206 Q&As
Questions 18

Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?

A. WEP

B. WPA

C. WPA2

D. TKIP

Browse 206 Q&As
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Mar 18, 2025
Questions: 206 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99