Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

212-81 Exam Dumps - EC-Council Certified Encryption Specialist (ECES)

Go to page:
Question # 33

John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?

A.

Kerberos

B.

EAP

C.

Radius

D.

CHAP

Full Access
Question # 34

Which of the following is not a key size used by AES?

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 b

Full Access
Question # 35

This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.

A.

SHA-256

B.

FORK-256

C.

SHA-1

D.

RSA

Full Access
Question # 36

Electromechanical rotor-based cipher used in World War II

A.

ROT13 Cipher

B.

Cipher Disk

C.

Enigma Machine

D.

Rail Fence Cipher

Full Access
Question # 37

How can rainbow tables be defeated?

A.

Lockout accounts under brute force password cracking attempts

B.

All uppercase character passwords

C.

Use of non-dictionary words

D.

Password salting

Full Access
Question # 38

Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.

A.

PKI

B.

GOST

C.

CA

D.

PIKE

Full Access
Question # 39

In 1977 researchers and MIT described what asymmetric algorithm?

A.

DH

B.

RSA

C.

AES

D.

EC

Full Access
Question # 40

The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).

A.

Odd numbers

B.

Fibonacci Sequence

C.

Fermat pseudoprime

D.

Prime numbers

Full Access
Go to page: