WGU D334 AIO POWERPOINT CHAPTER 1-6 STUDY
GUIDE QUESTIONS WITH 100% VERIFIED
ANSWERS
converting plaintext to cypher text by encryption ______
converting cipher text to plain text by decryption
Rest transport encryption ought to be used for
To encrypt individual files using aescrypt, use _____.
To encrypt the entire disk, use _____ or _____ with Bitlocker Filevault.
The creation of a single mapping from our alphabet to a cipher is known as
mono alphabetic code or substitution ________.
The term "polyalphabetic" describes how our alphabet is mapped to several
cipher alphabets.
Because one time pad _______ only employs its encryption code once, it is
regarded as unbreakable.
PRNGs, or pseudo random number generators
After a specified amount of time (periodic), the random numbers are repeated
using this method.
, They are helpful in creating a repeated collection of random numbers and are
quick and deterministic.
TRNG, or true random number generator
Using a random process of some kind, this method produces a truly random
number.
This method is typically non-periodic, sluggish, and non-deterministic.
analysis of frequency
a method based on the relative frequency of different letters in the English
language.
The level of uncertainty in the encryption process is known as entropy ___.
Which encryption is quicker for hardware? Is it software or hardware?
The Hardware Security Module (HSM) _______ is a physical device that
protects and controls the cryptographic key and performs cryptographic
processing. It is tamper-resistant and apparent.
A dedicated processor known as the trusted platform module (TPM) A _____
manages hardware-level encryption and enables full disk encryption on a hard
drive with the least possible impact on system performance.
Early cryptosystems that use pigpen
A cipher known as ____ mono-alphabetic substitution uses a mapping from
plaintext characters to graphical characters instead than alphabetic ones.
GUIDE QUESTIONS WITH 100% VERIFIED
ANSWERS
converting plaintext to cypher text by encryption ______
converting cipher text to plain text by decryption
Rest transport encryption ought to be used for
To encrypt individual files using aescrypt, use _____.
To encrypt the entire disk, use _____ or _____ with Bitlocker Filevault.
The creation of a single mapping from our alphabet to a cipher is known as
mono alphabetic code or substitution ________.
The term "polyalphabetic" describes how our alphabet is mapped to several
cipher alphabets.
Because one time pad _______ only employs its encryption code once, it is
regarded as unbreakable.
PRNGs, or pseudo random number generators
After a specified amount of time (periodic), the random numbers are repeated
using this method.
, They are helpful in creating a repeated collection of random numbers and are
quick and deterministic.
TRNG, or true random number generator
Using a random process of some kind, this method produces a truly random
number.
This method is typically non-periodic, sluggish, and non-deterministic.
analysis of frequency
a method based on the relative frequency of different letters in the English
language.
The level of uncertainty in the encryption process is known as entropy ___.
Which encryption is quicker for hardware? Is it software or hardware?
The Hardware Security Module (HSM) _______ is a physical device that
protects and controls the cryptographic key and performs cryptographic
processing. It is tamper-resistant and apparent.
A dedicated processor known as the trusted platform module (TPM) A _____
manages hardware-level encryption and enables full disk encryption on a hard
drive with the least possible impact on system performance.
Early cryptosystems that use pigpen
A cipher known as ____ mono-alphabetic substitution uses a mapping from
plaintext characters to graphical characters instead than alphabetic ones.