Cryptography WGU 2025/2026/2027
Which certificate management process involves key recovery? - correct answerIssued
A security analyst is validating the integrity and authenticity of a data transaction.Which
PKI component is being used? - correct answerDigital signature
Which PKI component generates digital certificates? - correct answerCertificate
authority (CA)
What is the maximum length (in bits) of encryption keys used by the WEP protocol? -
correct answer40
Which default port must be open for the IPsec key exchange to be successful? - correct
answerUDP 500
Which protocol indicates the virtual private network (VPN) is using Authentication
Header (AH)? - correct answer51
Which mode of block encryption results in the same outcome for matching blocks of a
plaintext message? - correct answerElectronic Code Book (ECB)
Which technique should a security analyst use to determine the key length in a
Vigenère cipher? - correct answerKasiski examination
What is 29 mod 12? - correct answer5
How many characters are used in an LM hash password? - correct answer14
What is the key size for RC4 with WEP? - correct answer40 bits
Which wireless security standard uses a 128-bit RC4 stream cipher for encrypted
communications? - correct answerWPA
Which mechanism can be used to ensure perfect forward secrecy during key exchange
when using symmetric encryption? - correct answerECDH
Which encryption component ensures that the compromise of a long-term key prevents
the compromise of any previous session keys? - correct answerForward secrecy
Which certificate management process involves key recovery? - correct answerIssued
A security analyst is validating the integrity and authenticity of a data transaction.Which
PKI component is being used? - correct answerDigital signature
Which PKI component generates digital certificates? - correct answerCertificate
authority (CA)
What is the maximum length (in bits) of encryption keys used by the WEP protocol? -
correct answer40
Which default port must be open for the IPsec key exchange to be successful? - correct
answerUDP 500
Which protocol indicates the virtual private network (VPN) is using Authentication
Header (AH)? - correct answer51
Which mode of block encryption results in the same outcome for matching blocks of a
plaintext message? - correct answerElectronic Code Book (ECB)
Which technique should a security analyst use to determine the key length in a
Vigenère cipher? - correct answerKasiski examination
What is 29 mod 12? - correct answer5
How many characters are used in an LM hash password? - correct answer14
What is the key size for RC4 with WEP? - correct answer40 bits
Which wireless security standard uses a 128-bit RC4 stream cipher for encrypted
communications? - correct answerWPA
Which mechanism can be used to ensure perfect forward secrecy during key exchange
when using symmetric encryption? - correct answerECDH
Which encryption component ensures that the compromise of a long-term key prevents
the compromise of any previous session keys? - correct answerForward secrecy