EC-Council 212-81 Exam
Certified Encryption Specialist (Page 14 )

Updated On: 12-Feb-2026

_____ uses at least two different shifts, changing the shift with different letters in the plain text.

  1. Caesar cipher
  2. multi-alphabet encryption
  3. Scytale
  4. Atbash

Answer(s): B

Explanation:

multi-alphabet encryption https://en.wikipedia.org/wiki/Polyalphabetic_cipher
Two different shifts create two different alphabets.
For +1 and +2
Plaintext alphabet
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
2 ciphertext alphabets
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B

Incorrect answers:
Scytale - transposition cipher
Caesar cipher - monoalphabetic cipher
Atbash - monoalphabetic cipher



Jane is looking for an algorithm to ensure message integrity.
Which of following would be an acceptable choice?

  1. RSA
  2. AES
  3. RC4
  4. SHA-1

Answer(s): D

Explanation:

Integrity. In information security, data integrity means maintaining and assuring the accuracy and completeness of data over its entire lifecycle. This means that data cannot be modified in an unauthorized or undetected manner.
An important application of hashes is verification of message integrity. Comparing message digests (hash digests over the message) calculated before, and after, transmission can determine whether any changes have been made to the message or file.
SHA-1
https://en.wikipedia.org/wiki/SHA-1
SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest ­ typically rendered as a hexadecimal number, 40 digits long. It was designed by the United States National Security Agency, and is a U.S.
Federal Information Processing Standard.
Incorrect answers:
RSA (Rivest­Shamir­Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.
RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher.
AES (Advanced Encryption Standard) is a subset of the Rijndael block cipher



If you wished to see a list of revoked certificates from a CA, where would you look?

  1. RA
  2. RFC
  3. CRL
  4. CA

Answer(s): C

Explanation:

CRL
https://ru.wikipedia.org/wiki/Certificate_Revocation_List Certificate Revocation List (or CRL) is "a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should no longer be trusted".
Incorrect answers:
RA - Used to proxy the certificate requests on behalf of the user and validate whether or not they are legitimate instead of having the user go directly to the CA. The RA talks to the subordinate CA on behalf of the user, which makes it harder for the actor to get directly to the certificate authority and do harm.

RFC ­ Request for Comments (RFC) is a publication from the Internet Society (ISOC) and its associated bodies, most prominently the Internet Engineering Task Force (IETF), the principal technical development and standards-setting bodies for the Internet. CA - certificate authority or certification authority is an entity that issues digital certificates



Which of the following are valid key sizes for AES (choose three)?

  1. 192
  2. 56
  3. 256
  4. 128
  5. 512
  6. 64

Answer(s): A,C,D

Explanation:

Correct answers: 128, 192, 256
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a subset of the Rijndael block cipher developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal to NIST during the AES selection process. Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.



A cipher is defined as what

  1. The algorithm(s) needed to encrypt and decrypt a message
  2. Encrypted text
  3. The key used to encrypt a message
  4. Any algorithm used in cryptography

Answer(s): A

Explanation:

The algorithm(s) needed to encrypt and decrypt a message https://en.wikipedia.org/wiki/Cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption--a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.






Post your Comments and Discuss EC-Council 212-81 exam prep with other Community members:

Join the 212-81 Discussion