1
For Expert help and assignment solutions, +254707240657
WGU C839 OBJECTIVE ASSESSMENT 2
LATEST VERSIONS (VERSION A & B) 2024-
2025 /WGU C839 INTRODUCTION TO
CRYPTOGRAPHY OA ACTUAL EXAM
Which encryption standard uses the same key to encrypt and
decrypt messages?[ ANS: ]Symmetric
© 2025 Assignment Expert
Which algorithm is designated as a Type 2 product by the
National Security Agency (NSA)?[ ANS: ]Skipjack
What is the most commonly used format for certificates?[ ANS:
Guru01 - Stuvia
]X.509 v3
What is referenced to determine if a certificate has been
revoked?[ ANS: ]Certificate revocation list (CRL)
What needs to be installed on end users' computers to allow them
to trust applications that have been digitally signed by the
developer?[ ANS: ]Sender's public key
Which type of certificate must be certified by an authority to verify
it with other participants?[ ANS: ]Public Certificate
What is an attribute of the Rivest Cipher 4 (RC4) algorithm?[ ANS:
]It requires a unique nonce.
Which mode generates the key stream with a nonce and
incrementing value?[ ANS: ]Counter (CTR)
Which mode is a stream algorithm that concatenates an
incrementing value with a nonce?[ ANS: ]Counter (CTR)
, 2
For Expert help and assignment solutions, +254707240657
Which key would an administrator use to encrypt data so only the
CEO can decrypt it?[ ANS: ]CEO's public key
What is the result of a hash function?[ ANS: ]Digest
What is used to efficiently encrypt large files?[ ANS: ]Symmetric
encryption
An administrator needs to encrypt the following word with the
Atbash cipher: security What is the correct ciphertext?[ ANS:
]hvxfirgb
© 2025 Assignment Expert
Which cryptographic algorithm has a 128-bit hash size?[ ANS:
]Message Digest Algorithm 5 (MD5)
Guru01 - Stuvia
Which characteristic makes a hashing function suitable for use in
signature schemes?[ ANS: ]Collision resistance
Which attribute of a hashing function makes a birthday attack
possible?[ ANS: ]Partial-message collision
Which hash algorithm produces a 160-bit output value?[ ANS:
]SHA-1
What does cipher block chaining (CBC) use with the key to
encrypt subsequent blocks of plaintext?[ ANS: ]Previous
generated ciphertext
Which mode produces the same ciphertext from two identical
plaintext blocks?[ ANS: ]Electronic codebook (ECB)
Which encryption mode is least secure?[ ANS: ]Electronic
codebook (ECB)
For Expert help and assignment solutions, +254707240657
WGU C839 OBJECTIVE ASSESSMENT 2
LATEST VERSIONS (VERSION A & B) 2024-
2025 /WGU C839 INTRODUCTION TO
CRYPTOGRAPHY OA ACTUAL EXAM
Which encryption standard uses the same key to encrypt and
decrypt messages?[ ANS: ]Symmetric
© 2025 Assignment Expert
Which algorithm is designated as a Type 2 product by the
National Security Agency (NSA)?[ ANS: ]Skipjack
What is the most commonly used format for certificates?[ ANS:
Guru01 - Stuvia
]X.509 v3
What is referenced to determine if a certificate has been
revoked?[ ANS: ]Certificate revocation list (CRL)
What needs to be installed on end users' computers to allow them
to trust applications that have been digitally signed by the
developer?[ ANS: ]Sender's public key
Which type of certificate must be certified by an authority to verify
it with other participants?[ ANS: ]Public Certificate
What is an attribute of the Rivest Cipher 4 (RC4) algorithm?[ ANS:
]It requires a unique nonce.
Which mode generates the key stream with a nonce and
incrementing value?[ ANS: ]Counter (CTR)
Which mode is a stream algorithm that concatenates an
incrementing value with a nonce?[ ANS: ]Counter (CTR)
, 2
For Expert help and assignment solutions, +254707240657
Which key would an administrator use to encrypt data so only the
CEO can decrypt it?[ ANS: ]CEO's public key
What is the result of a hash function?[ ANS: ]Digest
What is used to efficiently encrypt large files?[ ANS: ]Symmetric
encryption
An administrator needs to encrypt the following word with the
Atbash cipher: security What is the correct ciphertext?[ ANS:
]hvxfirgb
© 2025 Assignment Expert
Which cryptographic algorithm has a 128-bit hash size?[ ANS:
]Message Digest Algorithm 5 (MD5)
Guru01 - Stuvia
Which characteristic makes a hashing function suitable for use in
signature schemes?[ ANS: ]Collision resistance
Which attribute of a hashing function makes a birthday attack
possible?[ ANS: ]Partial-message collision
Which hash algorithm produces a 160-bit output value?[ ANS:
]SHA-1
What does cipher block chaining (CBC) use with the key to
encrypt subsequent blocks of plaintext?[ ANS: ]Previous
generated ciphertext
Which mode produces the same ciphertext from two identical
plaintext blocks?[ ANS: ]Electronic codebook (ECB)
Which encryption mode is least secure?[ ANS: ]Electronic
codebook (ECB)