100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Intro to Cryptography WGU C839 Module 4 PRACTICE EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS | ALREADY GRADED A+<recent version>

Rating
-
Sold
-
Pages
57
Grade
A+
Uploaded on
04-10-2025
Written in
2025/2026

Intro to Cryptography WGU C839 Module 4 PRACTICE EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS | ALREADY GRADED A+&lt;recent version&gt; 1) Symmetric - ANSWER Which encryption standard uses the same key to encrypt and decrypt messages? 2) Skipjack - ANSWER Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? 3) X.509 v3 - ANSWER What is the most commonly used format for certificates? 4) Certificate revocation list (CRL) - ANSWER What is referenced to determine if a certificate has been revoked? 5) Sender's public key - ANSWER What needs to be installed on end users' computers to allow them to trust applications that have been digitally signed by the developer? 6) Public Certificate - ANSWER Which type of certificate must be certified by an authority to verify it with other participants? 7) It requires a unique nonce. - ANSWER What is an attribute of the Rivest Cipher 4 (RC4) algorithm? 8) Counter (CTR) - ANSWER Which mode generates the key stream with a nonce and incrementing value? 9) Counter (CTR) - ANSWER Which mode is a stream algorithm that concatenates an incrementing value with a nonce? 10) CEO's public key - ANSWER Which key would an administrator use to encrypt data so only the CEO can decrypt it? 11) Digest - ANSWER What is the result of a hash function? 12) Symmetric encryption - ANSWER What is used to efficiently encrypt large files? 13) hvxfirgb - ANSWER An administrator needs to encrypt the following word with the Atbash cipher: security What is the correct ciphertext? 14) Message Digest Algorithm 5 (MD5) - ANSWER Which cryptographic algorithm has a 128-bit hash size? 15) Collision resistance - ANSWER Which characteristic makes a hashing function suitable for use in signature schemes? 16) Partial-message collision - ANSWER Which attribute of a hashing function makes a birthday attack possible? 17) SHA-1 - ANSWER Which hash algorithm produces a 160-bit output value? 18) Previous generated ciphertext - ANSWER What does cipher block chaining (CBC) use with the key to encrypt subsequent blocks of plaintext? 19) Electronic codebook (ECB) - ANSWER Which mode produces the same ciphertext from two identical plaintext blocks? 20) Electronic codebook (ECB) - ANSWER Which encryption mode is least secure? 21) P = E (K,C) - ANSWER What is the mathematical formula used for symmetric decryption? 22) Rivest-Shamir-Adleman - ANSWER Which algorithm relies on factoring the product of large prime numbers? 23) Pretty Good Privacy (PGP) - ANSWER Which encryption technology is a serial combination of hashing, data compression, symmetric-key cryptography, and public key infrastructure (PKI) and can be used for encrypting texts, emails, files, and directories or for full disk encryption? 24) Kerckhoffs's principle - ANSWER Which concept stipulates that algorithms should be openly shared and scrutinized, but keys must be absolutely secured? 25) Randomizing the initialization vector - ANSWER Which encryption process minimizes known plaintext attacks against Advanced Encryption Standard (AES)? 26) Salting - ANSWER What prevents a rainbow table attack during the encryption process? 27) Larger key size - ANSWER Which factor increases the required number of attempts in a brute-force attack? 28) Key length is too short. - ANSWER What is a vulnerability of the Data Encryption Standard (DES)? 29) 128 - ANSWER Which block size does the Advanced Encryption Standard (AES) use? 30) Skipjack - ANSWER Which block algorithm includes a provision for the decryption key kept in a key escrow? 31) A|C - ANSWER What is the result of A|B and B|C? 32) ( X mod P, X mod Q) - ANSWER How is X mod N if N = PQ represented in number theory? 33) 10000 - ANSWER What is the outcome when using the binary AND function on 11011 and 10100? 34) Counter (CTR) - ANSWER Which mode does the Fortuna algorithm use to generate random numbers? 35) Salt - ANSWER In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the is intermixed with the message that is to be hashed 36) MD5 - ANSWER This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function. 37) FORK256 - ANSWER This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged 38) RSA - ANSWER Which of the following is an asymmetric algorithm that was first publicaly described in 1977? 39) Me % n - ANSWER What equation describes the encryption process for RSA? 40) Elliptic Curve - ANSWER Which of the following is an asymmetric algorithm related to the equation y2 = x3 + Ax + B? 41) DSA - ANSWER Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186

Show more Read less
Institution
WGU C839
Course
WGU C839











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C839
Course
WGU C839

Document information

Uploaded on
October 4, 2025
Number of pages
57
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Intro to Cryptography WGU C839
Module 4
PRACTICE EXAM QUESTIONS WITH
CORRECT DETAILED ANSWERS |
ALREADY GRADED A+<RECENT
vERSION>


1) Symmetric - ANSWER Which encryption standard uses the same key to
encrypt and decrypt messages?


2) Skipjack - ANSWER Which algorithm is designated as a Type 2 product by
the National Security Agency (NSA)?


3) X.509 v3 - ANSWER What is the most commonly used format for
certificates?


4) Certificate revocation list (CRL) - ANSWER What is referenced to determine
if a certificate has been revoked?


5) Sender's public key - ANSWER What needs to be installed on end users'
computers to allow them to trust applications that have been digitally signed by
the developer?


6) Public Certificate - ANSWER Which type of certificate must be certified by
an authority to verify it with other participants?


7) It requires a unique nonce. - ANSWER What is an attribute of the Rivest
Cipher 4 (RC4) algorithm?

,8) Counter (CTR) - ANSWER Which mode generates the key stream with a
nonce and incrementing value?



9) Counter (CTR) - ANSWER Which mode is a stream algorithm that
concatenates an incrementing value with a nonce?



10) CEO's public key - ANSWER Which key would an administrator use to
encrypt data so only the CEO can decrypt it?


11) Digest - ANSWER What is the result of a hash function?



12) Symmetric encryption - ANSWER What is used to efficiently encrypt large
files?


13) hvxfirgb - ANSWER An administrator needs to encrypt the following word
with the Atbash cipher: security What is the correct ciphertext?


14) Message Digest Algorithm 5 (MD5) - ANSWER Which cryptographic
algorithm has a 128-bit hash size?


15) Collision resistance - ANSWER Which characteristic makes a hashing
function suitable for use in signature schemes?


16) Partial-message collision - ANSWER Which attribute of a hashing function
makes a birthday attack possible?


17) SHA-1 - ANSWER Which hash algorithm produces a 160-bit output value?



18) Previous generated ciphertext - ANSWER What does cipher block chaining
(CBC) use with the key to encrypt subsequent blocks of plaintext?

,19) Electronic codebook (ECB) - ANSWER Which mode produces the same
ciphertext from two identical plaintext blocks?


20) Electronic codebook (ECB) - ANSWER Which encryption mode is least
secure?


21) P = E (K,C) - ANSWER What is the mathematical formula used for
symmetric decryption?


22) Rivest-Shamir-Adleman - ANSWER Which algorithm relies on factoring the
product of large prime numbers?


23) Pretty Good Privacy (PGP) - ANSWER Which encryption technology is a
serial combination of hashing, data compression, symmetric-key cryptography,
and public key infrastructure (PKI) and can be used for encrypting texts, emails,
files, and directories or for full disk encryption?


24) Kerckhoffs's principle - ANSWER Which concept stipulates that algorithms
should be openly shared and scrutinized, but keys must be absolutely secured?


25) Randomizing the initialization vector - ANSWER Which encryption process
minimizes known plaintext attacks against Advanced Encryption Standard
(AES)?


26) Salting - ANSWER What prevents a rainbow table attack during the
encryption process?


27) Larger key size - ANSWER Which factor increases the required number of
attempts in a brute-force attack?


28) Key length is too short. - ANSWER What is a vulnerability of the Data
Encryption Standard (DES)?

, 29) 128 - ANSWER Which block size does the Advanced Encryption Standard
(AES) use?


30) Skipjack - ANSWER Which block algorithm includes a provision for the
decryption key kept in a key escrow?


31) A|C - ANSWER What is the result of A|B and B|C?



32) ( X mod P, X mod Q) - ANSWER How is X mod N if N = PQ represented in
number theory?


33) 10000 - ANSWER What is the outcome when using the binary AND function
on 11011 and 10100?


34) Counter (CTR) - ANSWER Which mode does the Fortuna algorithm use to
generate random numbers?




35) Salt - ANSWER In relationship to hashing, the term _____refers to random
bits that are used as one of the inputs to the hash. Essentially the is intermixed
with the message that is to be hashed


36) MD5 - ANSWER This is a 128 bit hash that is specified by RFC 1321. It was
designed by Ron Rivest in 1991 to replace an earlier hash function.


37) FORK256 - ANSWER This hash function uses 512-bit blocks and implements
preset constants that change after each repetition. Each block is hashed into a
256-bit block through four branches that divides each 512 block into sixteen 32-
bit words that are further encrypted and rearranged


38) RSA - ANSWER Which of the following is an asymmetric algorithm that was
first publicaly described in 1977?
$14.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
jervismuthami
4.0
(1)

Get to know the seller

Seller avatar
jervismuthami Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
7
Member since
6 months
Number of followers
0
Documents
560
Last sold
1 week ago

4.0

1 reviews

5
0
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions