100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Intro to Cryptography WGU C839 Module 4 PRACTICE EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS | ALREADY GRADED A+<recent version>

Puntuación
-
Vendido
-
Páginas
57
Grado
A+
Subido en
04-10-2025
Escrito en
2025/2026

Intro to Cryptography WGU C839 Module 4 PRACTICE EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS | ALREADY GRADED A+&lt;recent version&gt; 1) Symmetric - ANSWER Which encryption standard uses the same key to encrypt and decrypt messages? 2) Skipjack - ANSWER Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? 3) X.509 v3 - ANSWER What is the most commonly used format for certificates? 4) Certificate revocation list (CRL) - ANSWER What is referenced to determine if a certificate has been revoked? 5) Sender's public key - ANSWER What needs to be installed on end users' computers to allow them to trust applications that have been digitally signed by the developer? 6) Public Certificate - ANSWER Which type of certificate must be certified by an authority to verify it with other participants? 7) It requires a unique nonce. - ANSWER What is an attribute of the Rivest Cipher 4 (RC4) algorithm? 8) Counter (CTR) - ANSWER Which mode generates the key stream with a nonce and incrementing value? 9) Counter (CTR) - ANSWER Which mode is a stream algorithm that concatenates an incrementing value with a nonce? 10) CEO's public key - ANSWER Which key would an administrator use to encrypt data so only the CEO can decrypt it? 11) Digest - ANSWER What is the result of a hash function? 12) Symmetric encryption - ANSWER What is used to efficiently encrypt large files? 13) hvxfirgb - ANSWER An administrator needs to encrypt the following word with the Atbash cipher: security What is the correct ciphertext? 14) Message Digest Algorithm 5 (MD5) - ANSWER Which cryptographic algorithm has a 128-bit hash size? 15) Collision resistance - ANSWER Which characteristic makes a hashing function suitable for use in signature schemes? 16) Partial-message collision - ANSWER Which attribute of a hashing function makes a birthday attack possible? 17) SHA-1 - ANSWER Which hash algorithm produces a 160-bit output value? 18) Previous generated ciphertext - ANSWER What does cipher block chaining (CBC) use with the key to encrypt subsequent blocks of plaintext? 19) Electronic codebook (ECB) - ANSWER Which mode produces the same ciphertext from two identical plaintext blocks? 20) Electronic codebook (ECB) - ANSWER Which encryption mode is least secure? 21) P = E (K,C) - ANSWER What is the mathematical formula used for symmetric decryption? 22) Rivest-Shamir-Adleman - ANSWER Which algorithm relies on factoring the product of large prime numbers? 23) Pretty Good Privacy (PGP) - ANSWER Which encryption technology is a serial combination of hashing, data compression, symmetric-key cryptography, and public key infrastructure (PKI) and can be used for encrypting texts, emails, files, and directories or for full disk encryption? 24) Kerckhoffs's principle - ANSWER Which concept stipulates that algorithms should be openly shared and scrutinized, but keys must be absolutely secured? 25) Randomizing the initialization vector - ANSWER Which encryption process minimizes known plaintext attacks against Advanced Encryption Standard (AES)? 26) Salting - ANSWER What prevents a rainbow table attack during the encryption process? 27) Larger key size - ANSWER Which factor increases the required number of attempts in a brute-force attack? 28) Key length is too short. - ANSWER What is a vulnerability of the Data Encryption Standard (DES)? 29) 128 - ANSWER Which block size does the Advanced Encryption Standard (AES) use? 30) Skipjack - ANSWER Which block algorithm includes a provision for the decryption key kept in a key escrow? 31) A|C - ANSWER What is the result of A|B and B|C? 32) ( X mod P, X mod Q) - ANSWER How is X mod N if N = PQ represented in number theory? 33) 10000 - ANSWER What is the outcome when using the binary AND function on 11011 and 10100? 34) Counter (CTR) - ANSWER Which mode does the Fortuna algorithm use to generate random numbers? 35) Salt - ANSWER In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the is intermixed with the message that is to be hashed 36) MD5 - ANSWER This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function. 37) FORK256 - ANSWER This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged 38) RSA - ANSWER Which of the following is an asymmetric algorithm that was first publicaly described in 1977? 39) Me % n - ANSWER What equation describes the encryption process for RSA? 40) Elliptic Curve - ANSWER Which of the following is an asymmetric algorithm related to the equation y2 = x3 + Ax + B? 41) DSA - ANSWER Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186

Mostrar más Leer menos
Institución
WGU C839
Grado
WGU C839











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C839
Grado
WGU C839

Información del documento

Subido en
4 de octubre de 2025
Número de páginas
57
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Vista previa del contenido

Intro to Cryptography WGU C839
Module 4
PRACTICE EXAM QUESTIONS WITH
CORRECT DETAILED ANSWERS |
ALREADY GRADED A+<RECENT
vERSION>


1) Symmetric - ANSWER Which encryption standard uses the same key to
encrypt and decrypt messages?


2) Skipjack - ANSWER Which algorithm is designated as a Type 2 product by
the National Security Agency (NSA)?


3) X.509 v3 - ANSWER What is the most commonly used format for
certificates?


4) Certificate revocation list (CRL) - ANSWER What is referenced to determine
if a certificate has been revoked?


5) Sender's public key - ANSWER What needs to be installed on end users'
computers to allow them to trust applications that have been digitally signed by
the developer?


6) Public Certificate - ANSWER Which type of certificate must be certified by
an authority to verify it with other participants?


7) It requires a unique nonce. - ANSWER What is an attribute of the Rivest
Cipher 4 (RC4) algorithm?

,8) Counter (CTR) - ANSWER Which mode generates the key stream with a
nonce and incrementing value?



9) Counter (CTR) - ANSWER Which mode is a stream algorithm that
concatenates an incrementing value with a nonce?



10) CEO's public key - ANSWER Which key would an administrator use to
encrypt data so only the CEO can decrypt it?


11) Digest - ANSWER What is the result of a hash function?



12) Symmetric encryption - ANSWER What is used to efficiently encrypt large
files?


13) hvxfirgb - ANSWER An administrator needs to encrypt the following word
with the Atbash cipher: security What is the correct ciphertext?


14) Message Digest Algorithm 5 (MD5) - ANSWER Which cryptographic
algorithm has a 128-bit hash size?


15) Collision resistance - ANSWER Which characteristic makes a hashing
function suitable for use in signature schemes?


16) Partial-message collision - ANSWER Which attribute of a hashing function
makes a birthday attack possible?


17) SHA-1 - ANSWER Which hash algorithm produces a 160-bit output value?



18) Previous generated ciphertext - ANSWER What does cipher block chaining
(CBC) use with the key to encrypt subsequent blocks of plaintext?

,19) Electronic codebook (ECB) - ANSWER Which mode produces the same
ciphertext from two identical plaintext blocks?


20) Electronic codebook (ECB) - ANSWER Which encryption mode is least
secure?


21) P = E (K,C) - ANSWER What is the mathematical formula used for
symmetric decryption?


22) Rivest-Shamir-Adleman - ANSWER Which algorithm relies on factoring the
product of large prime numbers?


23) Pretty Good Privacy (PGP) - ANSWER Which encryption technology is a
serial combination of hashing, data compression, symmetric-key cryptography,
and public key infrastructure (PKI) and can be used for encrypting texts, emails,
files, and directories or for full disk encryption?


24) Kerckhoffs's principle - ANSWER Which concept stipulates that algorithms
should be openly shared and scrutinized, but keys must be absolutely secured?


25) Randomizing the initialization vector - ANSWER Which encryption process
minimizes known plaintext attacks against Advanced Encryption Standard
(AES)?


26) Salting - ANSWER What prevents a rainbow table attack during the
encryption process?


27) Larger key size - ANSWER Which factor increases the required number of
attempts in a brute-force attack?


28) Key length is too short. - ANSWER What is a vulnerability of the Data
Encryption Standard (DES)?

, 29) 128 - ANSWER Which block size does the Advanced Encryption Standard
(AES) use?


30) Skipjack - ANSWER Which block algorithm includes a provision for the
decryption key kept in a key escrow?


31) A|C - ANSWER What is the result of A|B and B|C?



32) ( X mod P, X mod Q) - ANSWER How is X mod N if N = PQ represented in
number theory?


33) 10000 - ANSWER What is the outcome when using the binary AND function
on 11011 and 10100?


34) Counter (CTR) - ANSWER Which mode does the Fortuna algorithm use to
generate random numbers?




35) Salt - ANSWER In relationship to hashing, the term _____refers to random
bits that are used as one of the inputs to the hash. Essentially the is intermixed
with the message that is to be hashed


36) MD5 - ANSWER This is a 128 bit hash that is specified by RFC 1321. It was
designed by Ron Rivest in 1991 to replace an earlier hash function.


37) FORK256 - ANSWER This hash function uses 512-bit blocks and implements
preset constants that change after each repetition. Each block is hashed into a
256-bit block through four branches that divides each 512 block into sixteen 32-
bit words that are further encrypted and rearranged


38) RSA - ANSWER Which of the following is an asymmetric algorithm that was
first publicaly described in 1977?
$14.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
jervismuthami
4.0
(1)

Conoce al vendedor

Seller avatar
jervismuthami Teachme2-tutor
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
7
Miembro desde
6 meses
Número de seguidores
0
Documentos
560
Última venta
1 semana hace

4.0

1 reseñas

5
0
4
1
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes