Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

212-81 EC-Council Certified Encryption Specialist (ECES) Questions and Answers

Questions 4

What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?

Options:

A.

Chosen plaintext

B.

Differential cryptanalysis

C.

Known-plaintext attack

D.

Kasiski examination

Buy Now
Questions 5

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

Options:

A.

Key Schedule

B.

Feistel Network

C.

SHA-2

D.

Diffie-Helman

Buy Now
Questions 6

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

Options:

A.

Key distribution

B.

Security

C.

Scalability

D.

Speed

Buy Now
Questions 7

Which one of the following uses three different keys, all of the same size?

Options:

A.

3DES

B.

AES

C.

RSA

D.

DES

Buy Now
Questions 8

Which one of the following is an algorithm that uses variable length key from 1 to 256 bytes, which constitutes a state table that is used for subsequent generation of pseudorandom bytes and then a pseudorandom string of bits, which is XORed with the plaintext to produce the ciphertext?

Options:

A.

PIKE

B.

Twofish

C.

RC4

D.

Blowfish

Buy Now
Questions 9

Which of the following acts as a verifier for the certificate authority?

Options:

A.

Certificate Management system

B.

Directory management system

C.

Registration authority

D.

Certificate authority

Buy Now
Questions 10

Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.

Options:

A.

VPN

B.

PGP

C.

Cryptool

D.

VeraCrypt

Buy Now
Questions 11

Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm.

Options:

A.

Blowfish

B.

Rijndael

C.

Lucifer

D.

El Gamal

Buy Now
Questions 12

Which of the following statements is most true regarding binary operations and encryption?

Options:

A.

They can provide secure encryption

B.

They are only useful as a teaching method

C.

They can form a part of viable encryption methods

D.

They are completely useless

Buy Now
Questions 13

If the round function is a cryptographically secure pseudorandom function, then ___________ rounds is sufficient to make the block cipher a pseudorandom permutation.

Options:

A.

2

B.

15

C.

16

D.

3

Buy Now
Questions 14

Which one of the following best describes a process that splits the block of plaintext into two separate blocks, then applies the round function to one half, and finally swaps the two halves?

Options:

A.

Block ciphers

B.

Symmetric cryptography

C.

Feistel cipher

D.

Substitution cipher

Buy Now
Questions 15

This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.

Options:

A.

RC4

B.

Blowfish

C.

Twofish

D.

FISH

Buy Now
Questions 16

Changes to one character in the plain text affect multiple characters in the cipher text, unlike in historical algorithms where each plain text character only affect one cipher text character.

Options:

A.

Substitution

B.

Avalanche

C.

Confusion

D.

Diffusion

Buy Now
Questions 17

Which of the following are valid key sizes for AES (choose three)?

Options:

A.

192

B.

56

C.

256

D.

128

E.

512

F.

64

Buy Now
Questions 18

This is a proprietary version of PAP. Encrypts username and password as it is sent across network.

Options:

A.

PPTP VPN

B.

S-PAP

C.

Kerberos

D.

WPA2

Buy Now
Questions 19

A real time protocol for verifying certificates (and a newer method than CRL).

Options:

A.

Online Certificate Status Protocol (OCSP)

B.

Server-based Certificate Validation Protocol (SCVP)

C.

Public Key Infrastructure (PKI)

D.

Registration Authority (RA)

Buy Now
Questions 20

Which of the following is an asymmetric cipher?

Options:

A.

RSA

B.

AES

C.

DES

D.

RC4

Buy Now
Questions 21

Which of the following techniques is used (other than brute force) to attempt to derive a key?

Options:

A.

Cryptography

B.

Cryptoanalysis

C.

Password cracking

D.

Hacking

Buy Now
Questions 22

Which one of the following is a symmetric key system using 64-bit blocks?

Options:

A.

DES

B.

PGP

C.

DSA

D.

RSA

Buy Now
Questions 23

John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?

Options:

A.

Kerberos

B.

EAP

C.

Radius

D.

CHAP

Buy Now
Questions 24

The time and effort required to break a security measure.

Options:

A.

Session Key

B.

Work factor

C.

Non-repudiation

D.

Payload

Buy Now
Questions 25

Which of the following would be the weakest encryption algorithm?

Options:

A.

DES

B.

AES

C.

RSA

D.

EC

Buy Now
Questions 26

John works as a cryptography consultant. He finds that people often misunderstand the reality of breaking a cipher. What is the definition of breaking a cipher?

Options:

A.

Finding any method that is more efficient than brute force

B.

Uncovering the algorithm used

C.

Rendering the cypher no longer useable

D.

Decoding the key

Buy Now
Questions 27

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

Options:

A.

SHA1

B.

SHA-256

C.

RSA

D.

MD5

Buy Now
Questions 28

A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.

Options:

A.

Total Break

B.

Distinguishing Algorithm

C.

Instance Deduction

D.

Information Deduction

Buy Now
Questions 29

Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?

Options:

A.

Differential Analysis

B.

Discrete Cosine Transform

C.

Raw Quick Pair

D.

Chi squared analysis

Buy Now
Questions 30

If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.

Options:

A.

15

B.

16

C.

3

D.

4

Buy Now
Questions 31

What is a "Collision attack" in cryptography?

Options:

A.

Collision attacks try to break the hash into three parts to get the plaintext value

B.

Collision attacks try to get the public key

C.

Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key

D.

Collision attacks try to find two inputs producing the same

Buy Now
Questions 32

Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?

Options:

A.

A substitution box where input bits are replaced

B.

A black box for the algorithm implementation

C.

A shifting box where input bits are shifted

D.

Another name for the round function

Buy Now
Questions 33

Original, unencrypted information is referred to as ____.

Options:

A.

text

B.

plaintext

C.

ciphertext

D.

cleartext

Buy Now
Questions 34

A linear congruential generator is an example of what?

Options:

A.

A coprime generator

B.

A prime number generator

C.

A pseudo random number generator

D.

A random number generator

Buy Now
Questions 35

Which of the following is a protocol for exchanging keys?

Options:

A.

DH

B.

EC

C.

AES

D.

RSA

Buy Now
Questions 36

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

Options:

A.

SHA2

B.

MD5

C.

MD4

D.

PIKE

Buy Now
Questions 37

What is the basis for the FISH algorithm?

Options:

A.

The Lagged Fibonacci generator

B.

Prime number theory

C.

Equations that describe an ellipse

D.

The difficulty in factoring numbers

Buy Now
Questions 38

The mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.

Options:

A.

Cipher-block chaining (CBC)

B.

Electronic codebook (ECB)

C.

Output feedback (OFB)

D.

Cipher feedback (CFB)

Buy Now
Questions 39

Frank is trying to break into an encrypted file… He is attempting all the possible keys that could be used for this algorithm. Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?

Options:

A.

Rainbow table

B.

Frequency analysis

C.

Brute force

D.

Kasiski

Buy Now
Questions 40

If you use substitution alone, what weakness is present in the resulting cipher text?

Options:

A.

It is the same length as the original text

B.

It is easily broken with modern computers

C.

It maintains letter and word frequency

D.

It is too simple

Buy Now
Questions 41

Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?

Options:

A.

Atbash

B.

Caesar

C.

Scytale

D.

Vigenere

Buy Now
Questions 42

With Electronic codebook (ECB) what happens:

Options:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

The block cipher is turned into a stream cipher

D.

The cipher text from the current round is XORed with the plaintext for the next round

Buy Now
Questions 43

If you wished to see a list of revoked certificates from a CA, where would you look?

Options:

A.

RA

B.

RFC

C.

CRL

D.

CA

Buy Now
Questions 44

What is the solution to the equation 8 mod 3?

Options:

A.

1

B.

4

C.

3

D.

2

Buy Now
Questions 45

Which algorithm implements an unbalanced Feistel cipher?

Options:

A.

Skipjack

B.

RSA

C.

3DES

D.

Blowfish

Buy Now
Questions 46

Ferris has been assigned the task of selecting security for his company's wireless network. It is important that he pick the strongest form of wireless security. Which one of the following is the strongest wireless security?

Options:

A.

WEP

B.

WPA

C.

WPA2

D.

TKIP

Buy Now
Questions 47

Developed by Netscape and has been replaced by TLS. It was the preferred method used with secure websites.

Options:

A.

OCSP

B.

VPN

C.

CRL

D.

SSL

Buy Now
Questions 48

The reverse process from encoding - converting the encoded message back into its plaintext format.

Options:

A.

Substitution

B.

Whitening

C.

Encoding

D.

Decoding

Buy Now
Questions 49

What size block does AES work on?

Options:

A.

64

B.

128

C.

192

D.

256

Buy Now
Questions 50

In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?

Options:

A.

Me mod n

B.

Ce mod n

C.

y2 = x3 + Ax + B

D.

P = Cd mod n

Buy Now
Questions 51

Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?

Options:

A.

WEP

B.

WEP2

C.

WPA

D.

WPA2

Buy Now
Questions 52

A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.

Options:

A.

Chosen Plaintext Attack

B.

Steganography

C.

Rainbow Tables

D.

Transposition

Buy Now
Questions 53

With Cipher feedback (CFB) what happens?

Options:

A.

The key is reapplied

B.

The ciphertext block is encrypted then the ciphertext produced is XOR’d back with the plaintext to produce the current ciphertext block

C.

The block cipher is turned into a stream cipher

D.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

Buy Now
Questions 54

You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?

Options:

A.

CA

B.

X.509

C.

CRL

D.

RFC 2298

Buy Now
Questions 55

Which service in a PKI will vouch for the identity of an individual or company?

Options:

A.

CA

B.

CR

C.

KDC

D.

CBC

Buy Now
Questions 56

What size block does FORK256 use?

Options:

A.

64

B.

512

C.

256

D.

128

Buy Now
Questions 57

Which of the following is a substitution cipher used by ancient Hebrew scholars?

Options:

A.

Atbash

B.

Vigenere

C.

Caesar

D.

Scytale

Buy Now
Questions 58

Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.

Options:

A.

Keccak

B.

MD5

C.

SHA-1

D.

TIGER

Buy Now
Questions 59

Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?

Options:

A.

Pegasus

B.

Blowfish

C.

SHA1

D.

AES

Buy Now
Questions 60

Which of the following algorithms uses three different keys to encrypt the plain text?

Options:

A.

Skipjack

B.

AES

C.

Blowfish

D.

3DES

Buy Now
Questions 61

Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.

Options:

A.

TIGER

B.

GOST

C.

BEAR

D.

FORK-256

Buy Now
Exam Code: 212-81
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Oct 14, 2025
Questions: 206

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99