WGU D334 Intro to Cryptography OA
1. Describe the significance of the Public Key Cryptography Standard (PKCS) #12 in
the context of X.509 certificates.
PKCS #12 is a standard for creating public keys only.
PKCS #12 is irrelevant to the chain of trust.
PKCS #12 is significant because it allows for the secure storage and
transport of X.509 certificates and their associated private keys.
PKCS #12 is used solely for encrypting data without certificates.
2. If a message is encoded using the Bifid cipher and the grid is altered, how would
this affect the decryption process?
The decryption process would remain unaffected as the Bifid cipher is
resilient to grid changes.
The decryption process would require additional keys for successful
decoding.
The decryption process would become faster because of the altered
grid.
The decryption process would fail or yield incorrect results due to the
mismatch in the grid used.
Understand
3. The Playfair Cipher uses a matrix of size the
answers
5x5 Get in-depth
explanations
7x7 for any
question on
4x4 your practice
test.
6x6
Got it
,4. In a scenario where a user's private key has been compromised, which certificate
management process should be initiated to ensure key recovery and security?
Hold
Initialization
Issuance
Cancellation
5. Describe the role of the cancellation process in certificate management and
how it relates to key recovery.
The cancellation process involves the initial setup of a certificate
authority.
The cancellation process is used to issue new certificates to users.
The cancellation process in certificate management allows for the
recovery of keys when a certificate is no longer valid or has been
compromised.
The cancellation process is unrelated to key recovery and focuses on
certificate renewal.
6. What is the definition of "Kasiski examination"?
A method of attacking polyalphabetic substitution ciphers, such as the
Vigenère cipher
The method of cryptography in which someone chooses a number by
which to shift each letter of a text in the alphabet and substitute the new
letter for the letter being encrypted
A method of using techniques other than brute force to derive a
cryptographic key
An attack in which the attacker tries to decrypt a message by simply
applying every possible key in the keyspace
,7. A ______ is a value which only has factors of 1 and itself, and used in areas such as
key exchange and in public key encryption.
Digit
Prime number
Binary
Modulus Operator
8. What is an attribute of RC4 when used with WEP?
128-bit key
256-bit key
40-bit key
512-bit key
9. If a company decides to switch from WPA-Personal to WPA-Enterprise for its
wireless network, what key feature will enhance its security?
Support for Temporal Key Integrity Protocol
Use of a session key
Use of a 48-bit initialization vector
Support for an authentication server
10. Describe the significance of a root CA signing its certificate with its private key.
The root CA uses its private key to create a backup of the certificate.
The root CA encrypts its certificate with its public key to ensure
confidentiality.
The root CA signs its certificate with its private key to establish trust
and verify its authenticity.
, The root CA signs its certificate with its public key to allow anyone to
verify it.
11. Which cipher uses a grid to map letters into numeric values?
Vigenère
SHA-1
Bifid
Caesar
12. What is the primary role of a Certificate Authority (CA) in Public Key
Infrastructure (PKI)?
To generate encryption keys
To revoke digital certificates
To issue digital certificates
To manage certificate policies
13. Employee A sends employee B an encrypted message along with a digital
signature. Employee B wants to make sure that the message is truly from
employee A. What will employee B do to verify the source of the message?
Use employee A's private key to verify the digital signature
Use employee A's public key to verify the digital signature
Use employee B's private key to unencrypt the message
Use employee B's public key to unencrypt the message
14. If a network is using WEP and decides to upgrade to WPA with TKIP, what
specific security improvement should the network administrator expect?
Enhanced protection against replay attacks