Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

EC-Council Certified Encryption Specialist (ECES) Question and Answers

EC-Council Certified Encryption Specialist (ECES)

Last Update Nov 30, 2025
Total Questions : 206

We are offering FREE 212-81 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 212-81 free exam questions and then go for complete pool of EC-Council Certified Encryption Specialist (ECES) test questions that will help you more.

212-81 pdf

212-81 PDF

$36.75  $104.99
212-81 Engine

212-81 Testing Engine

$43.75  $124.99
212-81 PDF + Engine

212-81 PDF + Testing Engine

$57.75  $164.99
Questions 1

Storing private keys with a third party is referred to as what?

Options:

A.  

Key caching

B.  

Key storage

C.  

Key banking

D.  

Key escrow

Discussion 0
Questions 2

If you XOR 10111000 with 10101010, what is the result?

Options:

A.  

10111010

B.  

10101010

C.  

11101101

D.  

00010010

Discussion 0
Questions 3

Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.

Options:

A.  

Linear cryptanalysis

B.  

Replay attack

C.  

Side-channel attack

D.  

Social engineering attack

Discussion 0
Questions 4

Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.

Options:

A.  

Keccak

B.  

MD5

C.  

SHA-1

D.  

TIGER

Discussion 0
Questions 5

A ______ refers to a situation where two different inputs yield the same output.

Options:

A.  

Convergence

B.  

Collision

C.  

Transposition

D.  

Substitution

Discussion 0
Questions 6

Which one of the following uses three different keys, all of the same size?

Options:

A.  

3DES

B.  

AES

C.  

RSA

D.  

DES

Discussion 0
Questions 7

Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W. Kravitz, and adopted by the U. S. government in 1993 with FIPS 186?

Options:

A.  

DSA

B.  

AES

C.  

RC4

D.  

RSA

Discussion 0
Questions 8

Uses a formula, M_n = 2^n − 1 where n is a prime number, to generate primes. Works for 2, 3, 5, 7 but fails on 11 and on many other n values.

Options:

A.  

Fibonacci Numbers

B.  

Co-prime Numbers

C.  

Even Numbers

D.  

Mersenne Primes

Discussion 0
Questions 9

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

Options:

A.  

SHA-0

B.  

SHA-2

C.  

SHA-1

D.  

SHA-3

Discussion 0
Questions 10

Original, unencrypted information is referred to as ____.

Options:

A.  

text

B.  

plaintext

C.  

ciphertext

D.  

cleartext

Discussion 0
Questions 11

Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.

Options:

A.  

Key Schedule

B.  

Key Clustering

C.  

Key Space

D.  

Key Exchange

Discussion 0
Questions 12

A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.

Options:

A.  

ADFVGX Cipher

B.  

ROT13 Cipher

C.  

Book Ciphers

D.  

Cipher Disk

Discussion 0
Questions 13

During the process of encryption and decryption, what keys are shared?

Options:

A.  

Public keys

B.  

Public and private keys

C.  

User passwords

D.  

Private keys

Discussion 0
Questions 14

What advantage do symmetric algorithms have over asymmetric algorithms

Options:

A.  

It is easier to implement them in software

B.  

They are more secure

C.  

They are faster

D It is easier to exchange keys

Discussion 0
Questions 15

A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed

Options:

A.  

Туре 1

B.  

Туре 4

C.  

Туре 2

D.  

Туре 3

Discussion 0
Questions 16

Which method of password cracking takes the most time and effort?

Options:

A.  

Dictionary attack

B.  

Shoulder surfing

C.  

Brute force

D.  

Rainbow tables

Discussion 0
Questions 17

A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.

Options:

A.  

Skipjack

B.  

Blowfish

C.  

MD5

D.  

Serpent

Discussion 0
Questions 18

Which of the following are valid key sizes for AES (choose three)?

Options:

A.  

192

B.  

56

C.  

256

D.  

128

E.  

512

F.  

64

Discussion 0
Questions 19

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

Options:

A.  

Key distribution

B.  

Security

C.  

Scalability

D.  

Speed

Discussion 0
Questions 20

Which of the following is a block cipher?

Options:

A.  

AES

B.  

DH

C.  

RC4

D.  

RSA

Discussion 0
Questions 21

A list of certificates that have been revoked.

Options:

A.  

CA

B.  

CRL

C.  

PCBC

D.  

OCSP

Discussion 0
Questions 22

A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.

Options:

A.  

Blum Blum Shub

B.  

Elliptic Curve

C.  

Menezes-Qu-Vanstone

D.  

Euler's totient

Discussion 0
Questions 23

John is going to use RSA to encrypt a message to Joan. What key should he use?

Options:

A.  

A random key

B.  

Joan’s public key

C.  

A shared key

D.  

Joan’s private key

Discussion 0
Questions 24

Cryptographic hashes are often used for message integrity and password storage. It is important to understand the common properties of all cryptographic hashes. What is not true about a hash?

Options:

A.  

Few collisions

B.  

Reversible

C.  

Variable length input

D.  

Fixed length output

Discussion 0
Questions 25

Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?

Options:

A.  

Atbash

B.  

Caesar

C.  

Scytale

D.  

Vigenere

Discussion 0
Questions 26

Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and CA. Receives request, authenticates it and forwards it to the CA.

Options:

A.  

PKI (Public Key Infrastructure)

B.  

TTP (Trusted Third Party)

C.  

RA (Registration Authority)

D.  

CP (Certificate Policy)

Discussion 0
Questions 27

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.

Options:

A.  

Digital Signature

B.  

Hash

C.  

Ownership stamp

D.  

Digest

Discussion 0
Questions 28

You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as

Options:

A.  

Odd numbers with no divisors

B.  

Odd numbers

C.  

Any number only divisible by odd numbers

D.  

Any number only divisible by one and itself

Discussion 0
Questions 29

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

Options:

A.  

PKI

B.  

DES

C.  

RSA

D.  

Diffie-Helmann

Discussion 0