Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 212-81 Practice Exam with Questions & Answers | Set: 6

Questions 51

Which of the following is an asymmetric algorithm that was first publically described in 1977?

Options:
A.

Elliptic Curve

B.

Twofish

C.

DESX

D.

RSA

ECCouncil 212-81 Premium Access
Questions 52

If you use substitution alone, what weakness is present in the resulting cipher text?

Options:
A.

It is the same length as the original text

B.

It is easily broken with modern computers

C.

It maintains letter and word frequency

D.

It is too simple

Questions 53

This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.

Options:
A.

SHA1

B.

SHA-256

C.

RSA

D.

MD5

Questions 54

Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.

Options:
A.

Rail Fence Cipher

B.

Null Cipher

C.

Vigenere Cipher

D.

ROT-13

Questions 55

Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?

Options:
A.

Caesar cipher

B.

RSA

C.

PGP

D.

DES

Questions 56

Which of the following is an asymmetric cipher?

Options:
A.

RSA

B.

AES

C.

DES

D.

RC4

Questions 57

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?

Options:
A.

Elliptic Curve

B.

NMD5

C.

RSA

D.

Diffie-Hellman

Questions 58

Which one of the following is an authentication method that sends the username and password in cleartext?

Options:
A.

PAP

B.

CHAP

C.

Kerberos

D.

SPAP

Questions 59

How did the ATBASH cipher work?

Options:
A.

By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.)

B.

By rotating text a given number of spaces

C.

By Multi alphabet substitution

D.

By shifting each letter a certain number of spaces

Questions 60

With Electronic codebook (ECB) what happens:

Options:
A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

The block cipher is turned into a stream cipher

D.

The cipher text from the current round is XORed with the plaintext for the next round

Exam Code: 212-81
Certification Provider: ECCouncil
Exam Name: EC-Council Certified Encryption Specialist (ECES)
Last Update: Jul 10, 2025
Questions: 206