Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 7
Total 61 questions
Exam Code: 212-81                Update: Oct 15, 2025
Exam Name: EC-Council Certified Encryption Specialist (ECES)

ECCouncil EC-Council Certified Encryption Specialist (ECES) 212-81 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ________ integrity check mechanism provides security against a replay attack.

A.

CBC-MAC

B.

CRC-MAC

C.

CRC-32

D.

CBC-32

Question # 2

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

A.

128 bit and CRC

B.

128 bi and TKIP

C.

128 bit and CCMP

D.

64 bit and CCMP

Question # 3

Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.

A.

Tiger

B.

GOST

C.

RIPEMD

D.

ElGamal

Question # 4

Why is quantum computing a threat to RSA?

A.

The processing speed will brute force algorithms

B.

Quantum computers can solve the discrete logarithm problem

C.

Quantum computers can solve the birthday paradox

D.

Quantum computers can factor large integers in polynomial time

Question # 5

A _____ is a function that takes a variable-size input m and returns a fixed-size string.

A.

Feistel

B.

Asymmetric cipher

C.

Symmetric cipher

D.

Hash

Question # 6

You are explaining the details of the AES algorithm to cryptography students. You are discussing the derivation of the round keys from the shared symmetric key. The portion of AES where round keys are derived from the cipher key using Rijndael's key schedule is called what?

A.

The key expansion phase

B.

The round key phase

C.

The bit shifting phase

D.

The initial round

Question # 7

Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?

A.

RSA

B.

AES

C.

RC4

D.

SHA-1

Question # 8

The greatest weakness with symmetric algorithms is _____.

A.

They are less secure than asymmetric

B.

The problem of key exchange

C.

The problem of generating keys

D.

They are slower than asymmetric

Question # 9

The Clipper chip is notable in the history of cryptography for many reasons. First, it was designed for civilian used secure phones. Secondly, it was designed to use a very specific symmetric cipher. Which one of the following was originally designed to provide built-in cryptography for the Clipper chip?

A.

Blowfish

B.

Twofish

C.

Skipjack

D.

Serpent

Question # 10

During the process of encryption and decryption, what keys are shared?

A.

Public keys

B.

Public and private keys

C.

User passwords

D.

Private keys

Page: 1 / 7
Total 61 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025