Free Eccouncil 212-81 Exam Actual Questions

The questions for 212-81 were last updated On Mar 30, 2025

At ValidExamDumps, we consistently monitor updates to the Eccouncil 212-81 exam questions by Eccouncil. Whenever our team identifies changes in the exam questions,exam objectives, exam focus areas or in exam requirements, We immediately update our exam questions for both PDF and online practice exams. This commitment ensures our customers always have access to the most current and accurate questions. By preparing with these actual questions, our customers can successfully pass the Eccouncil Certified Encryption Specialist exam on their first attempt without needing additional materials or study guides.

Other certification materials providers often include outdated or removed questions by Eccouncil in their Eccouncil 212-81 exam. These outdated questions lead to customers failing their Eccouncil Certified Encryption Specialist exam. In contrast, we ensure our questions bank includes only precise and up-to-date questions, guaranteeing their presence in your actual exam. Our main priority is your success in the Eccouncil 212-81 exam, not profiting from selling obsolete exam questions in PDF or Online Practice Test.

 

Question No. 1

In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?

Show Answer Hide Answer
Correct Answer: D

IPSec has two different modes: transport mode and tunnel mode.

Only the tunnel mode can be used

https://en.wikipedia.org/wiki/IPsec

In tunnel mode, the entire IP packet is encrypted and authenticated. It is then encapsulated into a new IP packet with a new IP header. Tunnel mode is used to create virtual private networks for network-to-network communications (e.g. between routers to link sites), host-to-network communications (e.g. remote user access) and host-to-host communications (e.g. private chat).

Incorrect answers:

Encapsulating Security Payload (ESP) authentication must be used. ESP in transport mode does not provide integrity and authentication for the entire IP packet. However, in Tunnel Mode, where the entire original IP packet is encapsulated with a new packet header added, ESP protection is afforded to the whole inner IP packet (including the inner header) while the outer header (including any outer IPv4 options or IPv6 extension headers) remains unprotected.

IPSec does not involve gateways. Wrong.

Only transport mode can be used. Transport mode, the default mode for IPSec, provides for end-to-end security. It can secure communications between a client and a server. When using the transport mode, only the IP payload is encrypted.


Question No. 2

If you XOR 10111000 with 10101010, what is the result?

Show Answer Hide Answer
Correct Answer: D

00010010

https://en.wikipedia.org/wiki/XOR_cipher

1 0 1 1 1 0 0 0

1 0 1 0 1 0 1 0

________________

0 0 0 1 0 0 1 0


Question No. 3

Ahlen is using a set of pre-calculated hashes to attempt to derive the passwords from a Windows SAM file. What is a set of pre-calculated hashes used to derive a hashed password called?

Show Answer Hide Answer
Correct Answer: B

Rainbow table

https://en.wikipedia.org/wiki/Rainbow_table

A rainbow table is a precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a key derivation function (or credit card numbers, etc.) up to a certain length consisting of a limited set of characters. It is a practical example of a space--time tradeoff, using less computer processing time and more storage than a brute-force attack which calculates a hash on every attempt, but more processing time and less storage than a simple key derivation function with one entry per hash. Use of a key derivation that employs a salt makes this attack infeasible.


Question No. 4

Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?

Show Answer Hide Answer
Correct Answer: B

Blowfish

https://en.wikipedia.org/wiki/Blowfish_(cipher)

Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in many cipher suites and encryption products.


Question No. 5

Storing private keys with a third party is referred to as what?

Show Answer Hide Answer
Correct Answer: D

Key escrow

https://en.wikipedia.org/wiki/Key_escrow

Key escrow (also known as a ''fair'' cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third parties may include businesses, who may want access to employees' secure business-related communications, or governments, who may wish to be able to view the contents of encrypted communications (also known as exceptional access).