Deal of the Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-81 Exam

Certification Provider: Eccouncil
Exam Name: Certified Encryption Specialist
Duration: 120 Minutes
Number of questions in our database: 199
Exam Version: May. 19, 2023
212-81 Exam Official Topics:
  • Topic 1: Information Theory Cryptography Concepts/ Multi-Alphabet Substitution
  • Topic 2: Introduction and History of Cryptography/ Breaking the Vigen?re Cipher
  • Topic 3: Symmetric Cryptography & Hashes/ Single Substitution Weaknesses
  • Topic 4: Symmetric Block Cipher Algorithms/ Basic Facts of the Feistel Function
  • Topic 5: International Data Encryption Algorithm (IDEA)/ History of Cryptography
  • Topic 6: Number Theory and Asymmetric Cryptography/ Advanced Encryption Standard (AES)
  • Topic 7: Propagating Cipher-Block Chaining (PCBC)/ Naor-Reingold and Mersenne Twister Pseudorandom Function
  • Topic 8: Server-based Certificate Validation Protocol/ Classification of Random Number Generator
  • Topic 9: Shiva Password Authentication Protocol (S-PAP)/ Challenge-Handshake Authentication Protocol (CHAP)
  • Topic 10: Point-to-Point Tunneling Protocol (PPTP)/ National Security Agency and Cryptography
  • Topic 11: Cracking Modern Cryptography: Ciphertext-only and Related-key Attack/ Cracking Modern Cryptography: Chosen Plaintext Attack
  • Topic 12: Steganography Implementations/ Example of Symmetric Stream Ciphers: RC4
  • Topic 13: Birthday Paradox: Probability/ Mono-Alphabet Substitution
  • Topic 14: Cracking Modern Cryptography/ Example of Symmetric Stream Ciphers: PIKE

Free Eccouncil 212-81 Exam Actual Questions

The questions for 212-81 were last updated On May. 19, 2023

Question #1

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ________ integrity check mechanism provides security against a replay attack.

Reveal Solution Hide Solution
Correct Answer: A


A cipher block chaining message authentication code (CBC-MAC) is a technique for constructing a message authentication code from a block cipher. The message is encrypted with some block cipher algorithm in CBC mode to create a chain of blocks such that each block depends on the proper encryption of the previous block. This interdependence ensures that a change to any of the plaintext bits will cause the final encrypted block to change in a way that cannot be predicted or counteracted without knowing the key to the block cipher. Using in WPA2 for integrity check and provides security against a replay attack.

Question #2

Which method of password cracking takes the most time and effort?

Reveal Solution Hide Solution
Correct Answer: C

Brute force

A brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search.

A brute-force attack is a cryptanalytic attack that can, in theory, be used to attempt to decrypt any encrypted data (except for data encrypted in an information-theoretically secure manner). Such an attack might be used when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier.

Incorrect answers:

Rainbow tables -is a precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a key derivation function (or credit card numbers, etc.) up to a certain length consisting of a limited set of characters.

Dictionary attack -is a form of brute force attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying thousands or millions of likely possibilities, such as words in a dictionary or previously used passwords, often from lists obtained from past security breaches.

Shoulder surfing -is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder, either from keystrokes on a device or sensitive information being spoken and heard, also known as eavesdropping.

Question #3

This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.

Reveal Solution Hide Solution
Correct Answer: D


The FISH (FIbonacci SHrinking) stream cipher is a fast software based stream cipher using Lagged Fibonacci generators, plus a concept from the shrinking generator cipher. It was published by Siemens in 1993. FISH is quite fast in software and has a huge key length. However, in the same paper where he proposed Pike, Ross Anderson showed that FISH can be broken with just a few thousand bits of known plaintext.

Question #4

You are studying classic ciphers. You have been examining the difference between single substitution and multi-substitution. Which one of the following is an example of a multi-alphabet cipher?

Reveal Solution Hide Solution
Correct Answer: D


The Vigenre cipher is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword. It employs a form of polyalphabetic substitution.

First described by Giovan Battista Bellaso in 1553, the cipher is easy to understand and implement, but it resisted all attempts to break it until 1863, three centuries later. This earned it the description le chiffre indchiffrable (French for 'the indecipherable cipher'). Many people have tried to implement encryption schemes that are essentially Vigenre ciphers. In 1863, Friedrich Kasiski was the first to publish a general method of deciphering Vigenre ciphers.

Question #5

Which of the following is assured by the use of a hash?

Reveal Solution Hide Solution
Correct Answer: D


An important application of secure hashes is verification of message integrity. Comparing message digests (hash digests over the message) calculated before, and after, transmission can determine whether any changes have been made to the message or file.

Unlock all 212-81 Exam Questions with Advanced Practice Test Features:
  • Select Question Types you want
  • Set your Desired Pass Percentage
  • Allocate Time (Hours : Minutes)
  • Create Multiple Practice tests with Limited Questions
  • Customer Support
Get Full Access Now
Disscuss Eccouncil 212-81 Topics, Questions or Ask Anything Related

Save Cancel