100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C839 - Introduction to Cryptography Newest Complete 300 Frequently Tested Questions with Correct Verified Answers/ Graded A+

Rating
-
Sold
-
Pages
46
Grade
A+
Uploaded on
08-12-2024
Written in
2024/2025

WGU C839 - Introduction to Cryptography Newest Complete 300 Frequently Tested Questions with Correct Verified Answers/ Graded A+

Institution
WGU C839 - Introduction To Cryptography
Course
WGU C839 - Introduction to Cryptography











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C839 - Introduction to Cryptography
Course
WGU C839 - Introduction to Cryptography

Document information

Uploaded on
December 8, 2024
Number of pages
46
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C839 - Introduction to Cryptography Newest 2024- 2025 Complete
300 Frequently Tested Questions with Correct Verified Answers
1. What type of encryption uses different keys to en- D
crypt and decrypt the message?

A Symmetric
B Private key
C Secure
D Asymmetric

2. The most widely used asymmetric encryption algo- A
rithm is what?

A RSA
B Vigenere
C DES
D Caesar Cipher

3. Original, unencrypted information is referred to as B
____.

A text
B plaintext
C cleantext
D ciphertext

4. Which of the following is NOT an asymmetric sys- D
tem?

A PGP
B RSA
C SSL
D DES

5. In order for User A to send User B an encrypted mes- C
sage that only User B can read, User A must encrypt
message with which of the following keys?

A User A's public key
B User A's private key




, WGU C839 - Intro to Cryptography Newest 2024 -2025

C User B's public key
D User B's private key

6. The greatest weakness with symmetric algorithms is B
_____.

A They are less secure than asymmetric
B The problem of key exchange
C They are slower than asymmetric
D The problem of generating keys

7. Which of the following is generally true about block D
sizes?

A Smaller block sizes increase security
B Block sizes must be more than 256 bits to be secure
C Block size is irrelevant to security
D Larger block sizes increase security

8. A _____ is a function that takes a variable-size input B
m and returns a fixed-size string.

A Symmetric cipher
B Hash
C Asymmetric cipher
D Feistel

9. Which of the following is a cryptographic protocol D
that allows two parties to establish a shared key over
an insecure channel?

A Elliptic Curve
B RSA
C MD5
D Diffie-Hellman

10. A _________ is a digital representation of information A
that identifies you as a relevant entity by a trusted
third party?



, WGU C839 - Intro to Cryptography NEWEST 2024 -2025

A Digital Signature
B Hash
C Ownership stamp
D Digest

11. What is the standard used by most digital certifi- A
cates?

A X.509
B CRL
C RFC 2298
D OCSP

12. DES uses keys of what size? A

A 56 bits
B 192 bits
C 128 bits
D 64 bits

13. Which of the following is NOT a key size used by A
AES?

A 512 bits
B 128 bits
C 192 bits
D 256 bits

14. Which of the following was a multi alphabet cipher A
widely used from the 16th century (1553) to the early
20th century (1900s)?

A Vigenere
B Caesar
C Atbash
D Scytale

15. Which of the following is a substitution cipher used D
by ancient Hebrew scholars?



, WGU C839 - Intro to Cryptography Newest 2024 -2025

A Caesar
B Vigenere
C Scytale
D Atbash

16. Shifting each letter in the alphabet a fixed number of D
spaces to the right or left is an example of what?

A Bit shifting
B Confusion
C Multi substitution
D Single substitution

17. Which of the following most accurately defines en- A
cryption?

A changing a message so it can only be easily read
by the intended recipient

B Making binary changes to a message to conceal it

C changing a message using complex mathematics

D Applying keys to plain text

18. If you use substitution alone, what weakness is pre- D
sent in the resulting cipher text?

A It is the same length as the original text
B It is easily broken with modern computers.
C It is too simple.
D Because it maintains letter and word frequency.

19. _____ uses at least two different shifts, changing the B
shift with different letters in the plain text.

A Atbash
B multi-alphabet encryption
C Scytale
D Caesar cipher

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AceExam1 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
19
Member since
1 year
Number of followers
0
Documents
629
Last sold
2 weeks ago

As a tutor, I focus on offering accurate, reliable, and current study materials to support students in their exam preparation and assignments. My goal is to provide the best resources, such as summaries and nursing exam test banks, ensuring that students can buy with confidence. I encourage customers to leave reviews after purchases for quality assurance and to recommend my services to others. Thank you for your support and trust.

4.0

5 reviews

5
3
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions