100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C839 - Pre-Assessment: Introduction to Cryptography(Q & A)2023

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
08-06-2023
Written in
2022/2023

WGU C839 - Pre-Assessment: Introduction to Cryptography(Q & A)2023 Which encryption standard uses the same key to encrypt and decrypt messages? - Answer Symmetric Key Encryption Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? - Answer SKIPJACK What is the most commonly used format for certificates? - Answer X.509 v3 *Version 3* What is referenced to determine if a certificate has been revoked? - Answer Certificate Revocation List *(CRL)* What needs to be installed on *end users' computers* to allow them to *trust* applications that have been *digitally signed* by the developer? - Answer Sender's public key *(DEVELOPER's)* Which type of certificate *must be certified by an authority* to verify it with other participants? - Answer Public Certificate What is an attribute of the Rivest Cipher 4 (RC4) algorithm? - Answer It requires a unique nonce. *(# used ONCE)* Which mode generates the key stream with a nonce and incrementing value? - Answer Counter (CTR) *Generates the next keystream block* by encrypting successive *values* of a "counter" Which mode is a stream algorithm that concatenates an incrementing value with a nonce? - Answer Counter (CTR) Which key would an administrator use to encrypt data so *only the CEO can decrypt it?* - Answer CEO's public key Remember, when a specific person in an organization is the *ONLY* one you want to *DECRYPT* something, you must have their *PUBLIC* key What is the result of a hash function? - Answer Digest What is used to efficiently encrypt *large files?* - Answer Symmetric encryption An administrator needs to encrypt the following word with the Atbash cipher: *security* Which ciphertext is correct? - Answer hvxfirgb Remember this is a Mono-Alphabet Substitution Cipher that replaces each character with its corresponding alphabet character *IE: A=Z, B=Y, C=X, etc...* Which cryptographic algorithm has a 128-bit *HASH* size? - Answer Message *Digest* Algorithm 5 (MD5) Which characteristic makes a hashing function suitable for use in signature schemes? - Answer Collision resistance *Of the many properties that a good hash function should have, the one that is mentioned most often is collision resistance.* Which attribute of a hashing function makes a *birthday attack possible?* - Answer *Partial-message collision* The partial-message collision attacks *all rely on birthday attacks* Which *hash* algorithm produces a 160-bit output value? - Answer SHA-1 What does cipher block chaining (CBC) use *with the key to encrypt subsequent blocks* of plaintext? - Answer Previous generated ciphertext Which mode produces the same ciphertext from two identical plaintext blocks? - Answer Electronic codebook (ECB) There are many situations in which large blocks of text are repeated. For example, this chapter contains the words "ciphertext block" many times. If two of the occurrences happen to line up on a block boundary, then a plaintext block value will be repeated Which encryption *mode is least secure?* - Answer Electronic codebook (ECB) What is the mathematical formula used for symmetric decryption? - Answer *P = E (K,C)* P = Plain text E = Encryption/Decryption K = Key C = Cipher Text *Remember, if you DECRYPT something, you want to know the PLAIN TEXT* Which algorithm relies on factoring the product of large prime numbers? - Answer RSA Which *encryption technology* is a serial *combination* of hashing, data compression, symmetric-key cryptography, and public key infrastructure (PKI) and can be used for encrypting texts, emails, files, and directories or for full disk encryption? - Answer Pretty Good Privacy (PGP) *Remember, this is NOT an ALGORITHM, but... it uses other established Asymmetric and Symmetric Algorithms* Which concept stipulates that algorithms should be openly shared and scrutinized, but keys must be absolutely secured? - Answer Kerckhoffs's principle Which encryption process *minimizes known plaintext attacks* against Advanced Encryption Standard (AES)? - Answer Randomizing the initialization vector

Show more Read less
Institution
WGU C839 - Pre-Assessment: Introduction To Cryptog
Course
WGU C839 - Pre-Assessment: Introduction to Cryptog









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C839 - Pre-Assessment: Introduction to Cryptog
Course
WGU C839 - Pre-Assessment: Introduction to Cryptog

Document information

Uploaded on
June 8, 2023
Number of pages
6
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEO808 nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
1388
Member since
4 year
Number of followers
1123
Documents
9914
Last sold
3 days ago
Top Nursing Exam Resources

Hi! I’m a nursing student who creates clear, accurate, and exam-ready study materials for ATI, NCLEX, and core nursing courses. My uploads include complete summaries, verified exam answers, and organized notes designed to save you time and boost your scores. Everything in my store is updated, easy to follow, and built to help you study smarter, not harder.

3.8

222 reviews

5
107
4
35
3
36
2
11
1
33

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions