EC-Council 212-81 Exam Questions
Certified Encryption Specialist (Page 6 )

Updated On: 24-Feb-2026

Which of the following algorithms uses three different keys to encrypt the plain text?

  1. Skipjack
  2. AES
  3. Blowfish
  4. 3DES

Answer(s): D

Explanation:

3DES
https://en.wikipedia.org/wiki/Triple_DES
Triple DES (3DES) has a three different keys with same size (56-bit).
Incorrect answers:
AES. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits. Blowfish. Blowfish has a 64-bit block size and a variable key length from 32 bits up to 448 bits. Skipjack. Skipjack uses an 80-bit key to encrypt or decrypt 64-bit data blocks.



Original, unencrypted information is referred to as ____.

  1. text
  2. plaintext
  3. ciphertext
  4. cleartext

Answer(s): B

Explanation:

plaintext https://en.wikipedia.org/wiki/Plaintext
In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. Cleartext usually refers to data that is transmitted or stored unencrypted ("in clear").



Which of the following is a block cipher?

  1. AES
  2. DH
  3. RC4
  4. RSA

Answer(s): A

Explanation:

AES
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard AES is a subset of the Rijndael block cipher developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal to NIST during the AES selection process Incorrect answers:
RC4. RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher.
DH. Diffie­Hellman key exchange is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.
RSA. RSA (Rivest­Shamir­Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.



You are trying to find a modern method for security web traffic for use in your company's ecommerce web site.
Which one of the following is used to encrypt web pages and uses bilateral authentication?

  1. AES
  2. SSL
  3. TLS
  4. 3DES

Answer(s): C

Explanation:

TLS
https://en.wikipedia.org/wiki/Mutual_authentication
Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time, being a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS).
By default the TLS protocol only proves the identity of the server to the client using X.509 certificate and the authentication of the client to the server is left to the application layer. TLS also offers client- to-server authentication using client-side X.509 authentication. As it requires provisioning of the certificates to the clients and involves less user-friendly experience, it's rarely used in end-user applications.



An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.

  1. CHAP
  2. SPAP
  3. PAP
  4. EAP

Answer(s): A

Explanation:

CHAP
https://en.wikipedia.org/wiki/Challenge-Handshake_Authentication_Protocol Challenge-Handshake Authentication Protocol (CHAP) is an identity verification protocol that does not rely on sending a shared secret between the access-requesting party and the identity-verifying party (the authenticator). CHAP is based on a shared secret, but in order to authenticate, the authenticator sends a "challenge" message to the access-requesting party, which responds with a value calculated using a "one-way hash" function that takes as inputs the challenge and the shared secret. The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authentication succeeds, otherwise it fails. Following the establishment of an authenticated connection, the authenticator may send a challenge to the access-requesting party at random intervals, to which the access-requesting party will have to produce the correct response.
Incorrect answers:
EAP - A framework that allows for creation of different ways to provide authentication, such as smart cards
SPAP - Shiva Password Authentication Protocol, PAP with encryption for the usernames/passwords that are transmitted.
PAP - Password Authentication Protocol. Used to authenticate users, but is no longer used because the information was sent in cleartext.






Post your Comments and Discuss EC-Council 212-81 exam dumps with other Community members:

Join the 212-81 Discussion