EC-Council Certified Encryption Specialist (ECES)
Last Update Nov 30, 2025
Total Questions : 206
We are offering FREE 212-81 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 212-81 free exam questions and then go for complete pool of EC-Council Certified Encryption Specialist (ECES) test questions that will help you more.
Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.
Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.
A ______ refers to a situation where two different inputs yield the same output.
Which one of the following uses three different keys, all of the same size?
Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W. Kravitz, and adopted by the U. S. government in 1993 with FIPS 186?
Uses a formula, M_n = 2^n − 1 where n is a prime number, to generate primes. Works for 2, 3, 5, 7 but fails on 11 and on many other n values.
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.
A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.
A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed
A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?
A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.
John is going to use RSA to encrypt a message to Joan. What key should he use?
Cryptographic hashes are often used for message integrity and password storage. It is important to understand the common properties of all cryptographic hashes. What is not true about a hash?
Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?
Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and CA. Receives request, authenticates it and forwards it to the CA.
A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as
Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.