Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

212-81 Exam Dumps - EC-Council Certified Encryption Specialist (ECES)

Go to page:
Question # 9

Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.

A.

Scytale Cipher

B.

Playfair Cipher

C.

Homophonic Substitution

D.

ADFVGX Cipher

Full Access
Question # 10

What size key does Skipjack use?

A.

128 bit

B.

56 bit

C.

80 bit

D.

256 bit

Full Access
Question # 11

When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.

A.

Mersenne's number

B.

Fermat's number

C.

Euler's totient

D.

Fermat's prime

Full Access
Question # 12

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

A.

PKI

B.

DES

C.

RSA

D.

Diffie-Helmann

Full Access
Question # 13

_____ uses at least two different shifts, changing the shift with different letters in the plain text.

A.

Caesar cipher

B.

multi-alphabet encryption

C.

Scytale

D.

Atbash

Full Access
Question # 14

Which of the following would be the fastest.

A.

EC

B.

DH

C.

RSA

D.

AES

Full Access
Question # 15

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

A.

Wired Equivalent Privacy (WEP)

B.

Wi-Fi Protected Access 2 (WPA2)

C.

Wi-Fi Protected Access (WPA)

D.

Temporal Key Integrity Protocol (TKIP)

Full Access
Question # 16

What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?

A.

Chosen plaintext

B.

Differential cryptanalysis

C.

Known-plaintext attack

D.

Kasiski examination

Full Access
Go to page: