Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 212-81 Practice Exam with Questions & Answers | Set: 4

Questions 31

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?

Options:
A.

Vigenere's principle

B.

Shamir's principle

C.

Kerkchoff's principle

D.

Babbage's principle

ECCouncil 212-81 Premium Access
Questions 32

An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.

Options:
A.

Differential Cryptanalysis

B.

Linear Cryptanalysis

C.

Chosen Plaintext Attack

D.

Integral Cryptanalysis

Questions 33

A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.

Options:
A.

Total Break

B.

Distinguishing Algorithm

C.

Instance Deduction

D.

Information Deduction

Questions 34

A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.

Options:
A.

TIGER

B.

GOST

C.

MD5

D.

MD6

Questions 35

What size block does AES work on?

Options:
A.

64

B.

128

C.

192

D.

256

Questions 36

Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?

Options:
A.

A substitution box where input bits are replaced

B.

A black box for the algorithm implementation

C.

A shifting box where input bits are shifted

D.

Another name for the round function

Questions 37

What best describes the shifting of each letter a fixed number of spaces to the left or right?

Options:
A.

Single substitution

B.

Multi substitution

C.

XOR

D.

Bit shifting

Questions 38

This is a proprietary version of PAP. Encrypts username and password as it is sent across network.

Options:
A.

PPTP VPN

B.

S-PAP

C.

Kerberos

D.

WPA2

Questions 39

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

Options:
A.

SHA2

B.

MD5

C.

MD4

D.

PIKE

Questions 40

In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.

Options:
A.

Information deduction

B.

Total break

C.

Instance deduction

D.

Global deduction

Exam Code: 212-81
Certification Provider: ECCouncil
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Jul 10, 2025
Questions: 206