100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C839 OBJECTIVE ASSESSMENT FINAL

Rating
4.0
(2)
Sold
-
Pages
9
Grade
A+
Uploaded on
25-09-2024
Written in
2024/2025

WGU C839 OBJECTIVE ASSESSMENT FINAL

Institution
WGU C839
Course
WGU C839









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C839
Course
WGU C839

Document information

Uploaded on
September 25, 2024
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C839 OBJECTIVE ASSESSMENT FINAL

Which encryption standard uses the same key to encrypt and decrypt messages? -
ANSWER Symmetric

Which algorithm is designated as a Type 2 product by the National Security Agency
(NSA)? - ANSWER Skipjack

What is the most commonly used format for certificates? - ANSWER X.509 v3

What is referenced to determine if a certificate has been revoked? - ANSWER
Certificate revocation list (CRL)

What needs to be installed on end users' computers to allow them to trust
applications that have been digitally signed by the developer? - ANSWER Sender's
public key

Which type of certificate must be certified by an authority to verify it with other
participants? - ANSWER Public Certificate

What is an attribute of the Rivest Cipher 4 (RC4) algorithm? - ANSWER It requires a
unique nonce.

Which mode generates the key stream with a nonce and incrementing value? -
ANSWER Counter (CTR)

Which mode is a stream algorithm that concatenates an incrementing value with a
nonce? - ANSWER Counter (CTR)

Which key would an administrator use to encrypt data so only the CEO can decrypt
it? - ANSWER CEO's public key

What is the result of a hash function? - ANSWER Digest

What is used to efficiently encrypt large files? - ANSWER Symmetric encryption

An administrator needs to encrypt the following word with the Atbash cipher: security
What is the correct ciphertext? - ANSWER hvxfirgb

Which cryptographic algorithm has a 128-bit hash size? - ANSWER Message Digest
Algorithm 5 (MD5)

Which characteristic makes a hashing function suitable for use in signature
schemes? - ANSWER Collision resistance

Which attribute of a hashing function makes a birthday attack possible? - ANSWER
Partial-message collision

, Which hash algorithm produces a 160-bit output value? - ANSWER SHA-1

What does cipher block chaining (CBC) use with the key to encrypt subsequent
blocks of plaintext? - ANSWER Previous generated ciphertext

Which mode produces the same ciphertext from two identical plaintext blocks? -
ANSWER Electronic codebook (ECB)

Which encryption mode is least secure? - ANSWER Electronic codebook (ECB)

What is the mathematical formula used for symmetric decryption? - ANSWER P = E
(K,C)

Which algorithm relies on factoring the product of large prime numbers? - ANSWER
Rivest-Shamir-Adleman

Which encryption technology is a serial combination of hashing, data compression,
symmetric-key cryptography, and public key infrastructure (PKI) and can be used for
encrypting texts, emails, files, and directories or for full disk encryption? - ANSWER
Pretty Good Privacy (PGP)

Which concept stipulates that algorithms should be openly shared and scrutinized,
but keys must be absolutely secured? - ANSWER Kerckhoffs's principle

Which encryption process minimizes known plaintext attacks against Advanced
Encryption Standard (AES)? - ANSWER Randomizing the initialization vector

What prevents a rainbow table attack during the encryption process? - ANSWER
Salting

Which factor increases the required number of attempts in a brute-force attack? -
ANSWER Larger key size

What is a vulnerability of the Data Encryption Standard (DES)? - ANSWER Key
length is too short.

Which block size does the Advanced Encryption Standard (AES) use? - ANSWER
128

Which block algorithm includes a provision for the decryption key kept in a key
escrow? - ANSWER Skipjack

What is the result of A|B and B|C? - ANSWER A|C

How is X mod N if N = PQ represented in number theory? - ANSWER ( X mod P, X
mod Q)

What is the outcome when using the binary AND function on 11011 and 10100? -
ANSWER 10000

Reviews from verified buyers

Showing all 2 reviews
8 months ago

9 months ago

4.0

2 reviews

5
1
4
0
3
1
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GUARANTEEDSTORE Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
217
Member since
1 year
Number of followers
45
Documents
7878
Last sold
2 hours ago
EXCELLENT HOMEWORK HELP ,

EXCELLENT HOMEWORK HELP ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A Hello ,I am about quality, The documents herein quarantees an A+ for exams, essay, class discussion, term papers , quizlets and Q & A assigments, Do not hesistate to make your purchase. Investing in your education is a life invesment, ,I 'm a honest and friendly person,For more info you can contact me at Let study together,All THE BEST

4.8

3448 reviews

5
2856
4
434
3
109
2
28
1
21

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions