Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

212-81 Exam Dumps - EC-Council Certified Encryption Specialist (ECES)

Go to page:
Question # 57

In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).

A.

Carrier

B.

Signal

C.

Payload

D.

Channel

Full Access
Question # 58

A list of certificates that have been revoked.

A.

CA

B.

CRL

C.

PCBC

D.

OCSP

Full Access
Question # 59

What must occur in order for a cipher to be considered ‘broken’?

A.

Uncovering the algorithm used

B.

Decoding the key

C.

Finding any method that is more efficient than brute force

D.

Rendering the cipher no longer useable

Full Access
Question # 60

Which one of the following best describes a process that splits the block of plaintext into two separate blocks, then applies the round function to one half, and finally swaps the two halves?

A.

Block ciphers

B.

Symmetric cryptography

C.

Feistel cipher

D.

Substitution cipher

Full Access
Question # 61

With Electronic codebook (ECB) what happens:

A.

The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption

B.

The cipher text from the current round is XORed with the plaintext from the previous round

C.

The block cipher is turned into a stream cipher

D.

The cipher text from the current round is XORed with the plaintext for the next round

Full Access
Go to page: