100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU C784 OBJECTIVE ASSESSMENT LATEST

Puntuación
-
Vendido
-
Páginas
10
Grado
A+
Subido en
24-09-2024
Escrito en
2024/2025

WGU C784 OBJECTIVE ASSESSMENT LATEST

Institución
Grado

Vista previa del contenido

WGU C784 OBJECTIVE ASSESSMENT LATEST / WGU 784 OA
EXAM TEST BANK ACTUAL EXAM
Which encryption standard uses the same key to encrypt and decrypt messages? -
ANSWER: Symmetric

Which algorithm is designated as a Type 2 product by the National Security Agency
(NSA)? - ANSWER: Skipjack

What is the most commonly used format for certificates? - ANSWER: X.509 v3

What is referenced to determine if a certificate has been revoked? - ANSWER:
Certificate revocation list (CRL)

What needs to be installed on end users' computers to allow them to trust
applications that have been digitally signed by the developer? - ANSWER: Sender's
public key

Which type of certificate must be certified by an authority to verify it with other
participants? - ANSWER: Public Certificate

What is an attribute of the Rivest Cipher 4 (RC4) algorithm? - ANSWER: It requires a
unique nonce.

Which mode generates the key stream with a nonce and incrementing value? -
ANSWER: Counter (CTR)

Which mode is a stream algorithm that concatenates an incrementing value with a
nonce? - ANSWER: Counter (CTR)

Which key would an administrator use to encrypt data so only the CEO can decrypt
it? - ANSWER: CEO's public key

What is the result of a hash function? - ANSWER: Digest

What is used to efficiently encrypt large files? - ANSWER: Symmetric encryption

An administrator needs to encrypt the following word with the Atbash cipher:
security What is the correct ciphertext? - ANSWER: hvxfirgb

Which cryptographic algorithm has a 128-bit hash size? - ANSWER: Message Digest
Algorithm 5 (MD5)

Which characteristic makes a hashing function suitable for use in signature schemes?
- ANSWER: Collision resistance

, Which attribute of a hashing function makes a birthday attack possible? - ANSWER:
Partial-message collision

Which hash algorithm produces a 160-bit output value? - ANSWER: SHA-1

What does cipher block chaining (CBC) use with the key to encrypt subsequent
blocks of plaintext? - ANSWER: Previous generated ciphertext

Which mode produces the same ciphertext from two identical plaintext blocks? -
ANSWER: Electronic codebook (ECB)

Which encryption mode is least secure? - ANSWER: Electronic codebook (ECB)

What is the mathematical formula used for symmetric decryption? - ANSWER: P = E
(K,C)

Which algorithm relies on factoring the product of large prime numbers? - ANSWER:
Rivest-Shamir-Adleman

Which encryption technology is a serial combination of hashing, data compression,
symmetric-key cryptography, and public key infrastructure (PKI) and can be used for
encrypting texts, emails, files, and directories or for full disk encryption? -ANSWER:
Pretty Good Privacy (PGP)

Which concept stipulates that algorithms should be openly shared and scrutinized,
but keys must be absolutely secured? - ANSWER: Kerckhoffs's principle

Which encryption process minimizes known plaintext attacks against Advanced
Encryption Standard (AES)? - ANSWER: Randomizing the initialization vector

What prevents a rainbow table attack during the encryption process? - ANSWER:
Salting

Which factor increases the required number of attempts in a brute-force attack? -
ANSWER: Larger key size

What is a vulnerability of the Data Encryption Standard (DES)? - ANSWER: Key length
is too short.

Which block size does the Advanced Encryption Standard (AES) use? - ANSWER: 128

Which block algorithm includes a provision for the decryption key kept in a key
escrow? - ANSWER: Skipjack

What is the result of A|B and B|C? - ANSWER: A|C

Libro relacionado

Escuela, estudio y materia

Grado

Información del documento

Subido en
24 de septiembre de 2024
Número de páginas
10
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$18.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
tutorsection1 Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
44
Miembro desde
1 año
Número de seguidores
8
Documentos
1079
Última venta
2 días hace

4.9

458 reseñas

5
418
4
31
3
7
2
1
1
1

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes