Cryptography Questions with Answers | 100%
Correct | Latest Update 2026 /2027 - WGU
Which cipher is used with WEP?
A. RC5
B. RC4
C. TKIP
D. AES - correct answer RC4
How does TKIP improve WPA over WEP?
A. Hashes the initialization vector and secret key
B. Implements a RADIUS server
C. Implements an authentication server
D. Creates an AES encryption key - correct answer Hashes the initialization
vector and secret key
An administrator has configured a virtual private network (VPN) connection
utilizing IPsec tunnel mode with Encapsulating Security Payload (ESP)
between the corporate office and a remote office. Where can the packets be
inspected by intrusion detection systems (IDSs) and virus scanners?
A. Only at the headquarters
B. Only at the offsite location
,C. At the headquarters and the offsite location
D. Between the headquarters and the offsite location - correct answer At the
headquarters and the offsite location
Which protocol indicates the virtual private network (VPN) is using
Authentication
Header (AH)?
A. 48
B. 50
C. 51
D. 58 - correct answer 51
Which cipher uses a grid to map letters into numeric values?
A. Bifid
B. SHA-1
C. Caesar
D. Vigenère - correct answer Bifid
A business wants to use keys issued by a trusted third party to demonstrate to
potential customers that it is a legitimate organization. Which key is used to
sign the certificate issued to the business?
A. Private key of the root CA
B. Public key of the root CA
C. Private key of the company
, D. Public key of the company - correct answer Private key of the root CA
A business wants to use keys issued by a trusted third party to demonstrate it
is a legitimate organization to potential customers. Which key should the
business send to potential customers to prove its identity?
A. Private key of the root CA
B. Public key of the root CA
C. Private key of the company
D. Public key of the company - correct answer Public key of the company
What should an administrator use to import and export all items written
using X.509 that are part of a chain of trust?
A. CER
B. Public Key Cryptography Standard (PKCS) #7
C. Public Key Cryptography Standard (PKCS) #12
D. RTF - correct answer Public Key Cryptography Standard (PKCS) #12
Which default port must be open for the IPsec key exchange to be successful?
A. UDP 162
B. TCP 389
C. TCP 465
D. UDP 500 - correct answer UDP 500