and Answers 100% Correct {Grade A} -
WGU
Which of the following is NOT a symmetric cryptographic algorithm?
a. DES
b. Blowfish
c. 3DES
d. SHA - correct answer d. SHA
Which of the following is not to be decrypted but is only used for comparison
purposes?
a. Digest
b. Stream
c. Algorithm
d. Key - correct answer a. Digest
Which of these is NOT a characteristic of a secure hash algorithm?
a. The results of a hash function should not be reversed.
b. Collisions should occur no more than 15 percent of the time.
c. A message cannot be produced from a predefined hash.
d. The hash should always be the same fixed size. - correct answer b. Collisions should
occur no more than 15 percent of the time.
Deo has been asked to explain RSA to his colleague. After his explanation, Deo is
asked what, if any, weaknesses RSA has. How would Deo respond?
, Module 06 Basic Cryptography Questions
and Answers 100% Correct {Grade A} -
WGU
a. RSA has no known weaknesses.
b. RSA weaknesses are based on ECC.
c. The digest produced by the RSA algorithm is too short to be secure.
d. As computers become more powerful, the ability to compute factoring has
increase - correct answer d. As computers become more powerful, the ability to
compute factoring has increase
Which of these is the strongest symmetric cryptographic algorithm?
a. Advanced Encryption Standard
b. RC1
c. Triple Data Encryption Standard
d. Data Encryption Standard - correct answer a. Advanced Encryption Standard
If Bob wants to send a secure message to Alice using an asymmetric cryptographic
algorithm, which key does he use to encrypt the message?
a. Alice's public key
b. Bob's public key
c. Alice's private key
d. Bob's private key - correct answer a. Alice's public key
Egor wanted to use a digital signature. Which of the following benefits will the digital
signature NOT provide?
a. Verify the receiver