) Introduction to Cryptography
Questions with Answers {Grade A} 100%
Correct (Verified Answers) - WGU
Which cipher is used with WEP?
A. RC5
B. RC4
C. TKIP
D. AES - correct answer RC4
How does TKIP improve WPA over WEP?
A. Hashes the initialization vector and secret key
B. Implements a RADIUS server
C. Implements an authentication server
D. Creates an AES encryption key - correct answer Hashes the initialization vector and
secret key
An administrator has configured a virtual private network (VPN) connection utilizing
IPsec tunnel mode with Encapsulating Security Payload (ESP) between the corporate
office and a remote office. Where can the packets be inspected by intrusion detection
systems (IDSs) and virus scanners?
A. Only at the headquarters
B. Only at the offsite location
C. At the headquarters and the offsite location
, D 334 Pre-Assessment (Latest Update
) Introduction to Cryptography
Questions with Answers {Grade A} 100%
Correct (Verified Answers) - WGU
D. Between the headquarters and the offsite location - correct answer At the
headquarters and the offsite location
Which default port must be open for the IPsec key exchange to be successful?
A. UDP 162
B. TCP 389
C. TCP 465
D. UDP 500 - correct answer UDP 500
Which protocol indicates the virtual private network (VPN) is using Authentication
Header (AH)?
A. 48
B. 50
C. 51
D. 58 - correct answer 51
Which cipher uses a grid to map letters into numeric values?
A. Bifid
B. SHA-1
C. Caesar
D. Vigenère - correct answer Bifid
, D 334 Pre-Assessment (Latest Update
) Introduction to Cryptography
Questions with Answers {Grade A} 100%
Correct (Verified Answers) - WGU
A business wants to use keys issued by a trusted third party to demonstrate to
potential customers that it is a legitimate organization. Which key is used to sign the
certificate issued to the business?
A. Private key of the root CA
B. Public key of the root CA
C. Private key of the company
D. Public key of the company - correct answer Private key of the root CA
A business wants to use keys issued by a trusted third party to demonstrate it is a
legitimate organization to potential customers. Which key should the business send
to potential customers to prove its identity?
A. Private key of the root CA
B. Public key of the root CA
C. Private key of the company
D. Public key of the company - correct answer Public key of the company
What should an administrator use to import and export all items written using X.509
that are part of a chain of trust?
A. CER
B. Public Key Cryptography Standard (PKCS) #7
C. Public Key Cryptography Standard (PKCS) #12