WGU C168 OA LATEST EXAM ACTUAL EXAM QUESTIONS AND CORRECT ANSWERS
(VERIFIED ANSWERS) |ALREADY GRADED A+
Which encryption standard uses the same key to encrypt and decrypt messages? - (ANSWER)Symmetric
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? -
(ANSWER)Skipjack
What is the most commonly used format for certificates? - (ANSWER)X.509 v3
What is referenced to determine if a certificate has been revoked? - (ANSWER)Certificate revocation list
(CRL)
What needs to be installed on end users' computers to allow them to trust applications that have been
digitally signed by the developer? - (ANSWER)Sender's public key
Which type of certificate must be certified by an authority to verify it with other participants? -
(ANSWER)Public Certificate
What is an attribute of the Rivest Cipher 4 (RC4) algorithm? - (ANSWER)It requires a unique nonce.
Which mode generates the key stream with a nonce and incrementing value? - (ANSWER)Counter (CTR)
Which mode is a stream algorithm that concatenates an incrementing value with a nonce? -
(ANSWER)Counter (CTR)
Which key would an administrator use to encrypt data so only the CEO can decrypt it? - (ANSWER)CEO's
public key
What is the result of a hash function? - (ANSWER)Digest
, WGU C168 OA LATEST EXAM ACTUAL EXAM QUESTIONS AND CORRECT ANSWERS
(VERIFIED ANSWERS) |ALREADY GRADED A+
What is used to efficiently encrypt large files? - (ANSWER)Symmetric encryption
An administrator needs to encrypt the following word with the Atbash cipher: security What is the
correct ciphertext? - (ANSWER)hvxfirgb
Which cryptographic algorithm has a 128-bit hash size? - (ANSWER)Message Digest Algorithm 5 (MD5)
Which characteristic makes a hashing function suitable for use in signature schemes? -
(ANSWER)Collision resistance
Which attribute of a hashing function makes a birthday attack possible? - (ANSWER)Partial-message
collision
Which hash algorithm produces a 160-bit output value? - (ANSWER)SHA-1
What does cipher block chaining (CBC) use with the key to encrypt subsequent blocks of plaintext? -
(ANSWER)Previous generated ciphertext
Which mode produces the same ciphertext from two identical plaintext blocks? - (ANSWER)Electronic
codebook (ECB)
Which encryption mode is least secure? - (ANSWER)Electronic codebook (ECB)
What is the mathematical formula used for symmetric decryption? - (ANSWER)P = E (K,C)
Which algorithm relies on factoring the product of large prime numbers? - (ANSWER)Rivest-Shamir-
Adleman
(VERIFIED ANSWERS) |ALREADY GRADED A+
Which encryption standard uses the same key to encrypt and decrypt messages? - (ANSWER)Symmetric
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? -
(ANSWER)Skipjack
What is the most commonly used format for certificates? - (ANSWER)X.509 v3
What is referenced to determine if a certificate has been revoked? - (ANSWER)Certificate revocation list
(CRL)
What needs to be installed on end users' computers to allow them to trust applications that have been
digitally signed by the developer? - (ANSWER)Sender's public key
Which type of certificate must be certified by an authority to verify it with other participants? -
(ANSWER)Public Certificate
What is an attribute of the Rivest Cipher 4 (RC4) algorithm? - (ANSWER)It requires a unique nonce.
Which mode generates the key stream with a nonce and incrementing value? - (ANSWER)Counter (CTR)
Which mode is a stream algorithm that concatenates an incrementing value with a nonce? -
(ANSWER)Counter (CTR)
Which key would an administrator use to encrypt data so only the CEO can decrypt it? - (ANSWER)CEO's
public key
What is the result of a hash function? - (ANSWER)Digest
, WGU C168 OA LATEST EXAM ACTUAL EXAM QUESTIONS AND CORRECT ANSWERS
(VERIFIED ANSWERS) |ALREADY GRADED A+
What is used to efficiently encrypt large files? - (ANSWER)Symmetric encryption
An administrator needs to encrypt the following word with the Atbash cipher: security What is the
correct ciphertext? - (ANSWER)hvxfirgb
Which cryptographic algorithm has a 128-bit hash size? - (ANSWER)Message Digest Algorithm 5 (MD5)
Which characteristic makes a hashing function suitable for use in signature schemes? -
(ANSWER)Collision resistance
Which attribute of a hashing function makes a birthday attack possible? - (ANSWER)Partial-message
collision
Which hash algorithm produces a 160-bit output value? - (ANSWER)SHA-1
What does cipher block chaining (CBC) use with the key to encrypt subsequent blocks of plaintext? -
(ANSWER)Previous generated ciphertext
Which mode produces the same ciphertext from two identical plaintext blocks? - (ANSWER)Electronic
codebook (ECB)
Which encryption mode is least secure? - (ANSWER)Electronic codebook (ECB)
What is the mathematical formula used for symmetric decryption? - (ANSWER)P = E (K,C)
Which algorithm relies on factoring the product of large prime numbers? - (ANSWER)Rivest-Shamir-
Adleman