Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 212-81 Practice Exam with Questions & Answers | Set: 3

Questions 21

Which of the following statements is most true regarding binary operations and encryption?

Options:
A.

They can provide secure encryption

B.

They are only useful as a teaching method

C.

They can form a part of viable encryption methods

D.

They are completely useless

ECCouncil 212-81 Premium Access
Questions 22

In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed

Options:
A.

Vector

B.

Salt

C.

Stream

D.

IV

Questions 23

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.

Options:
A.

Digital Signature

B.

Hash

C.

Ownership stamp

D.

Digest

Questions 24

During the process of encryption and decryption, what keys are shared?

Options:
A.

Public keys

B.

Public and private keys

C.

User passwords

D.

Private keys

Questions 25

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?

Options:
A.

SHA-0

B.

SHA-2

C.

SHA-1

D.

SHA-3

Questions 26

You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as

Options:
A.

Odd numbers with no divisors

B.

Odd numbers

C.

Any number only divisible by odd numbers

D.

Any number only divisible by one and itself

Questions 27

Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?

Options:
A.

Pegasus

B.

Blowfish

C.

SHA1

D.

AES

Questions 28

A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.

Options:
A.

Blum Blum Shub

B.

Elliptic Curve

C.

Menezes-Qu-Vanstone

D.

Euler's totient

Questions 29

3DES can best be classified as which one of the following?

Options:
A.

Digital signature

B.

Symmetric algorithm

C.

Asymmetric algorithm

D.

Hashing algorithm

Questions 30

Which one of the following is an example of a symmetric key algorithm?

Options:
A.

ECC

B.

Diffie-Hellman

C.

RSA

D.

Rijndael

Exam Code: 212-81
Certification Provider: ECCouncil
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Jul 9, 2025
Questions: 206