100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU Course C839 - Intro to Cryptography with Complete Solutions

Puntuación
-
Vendido
-
Páginas
30
Grado
A+
Subido en
21-07-2025
Escrito en
2024/2025

1 / 30 WGU Course C839 - Intro to Cryptography with Complete Solutions What type of encryption uses different keys to encrypt and decrypt the message? A Symmetric B Private key C Secure D Asymmetric - ANSWER -D The most widely used asymmetric encryption algorithm is what? A RSA B Vigenere C DES D Caesar Cipher - ANSWER -A Original, unencrypted information is referred to as __

Mostrar más Leer menos
Institución
WGU Course C839 - Intro To Cryptography
Grado
WGU Course C839 - Intro to Cryptography










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU Course C839 - Intro to Cryptography
Grado
WGU Course C839 - Intro to Cryptography

Información del documento

Subido en
21 de julio de 2025
Número de páginas
30
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU Course C839 - Intro to Cryptography with Complete Solutions

What type of encryption uses different keys B User A's private key
to encrypt and decrypt the message? C User B's public key
D User B's private key - ANSWER -C
A Symmetric
B Private key
C Secure The greatest weakness with symmetric
D Asymmetric - ANSWER -D algorithms is _____.

A They are less secure than asymmetric
The most widely used asymmetric encryption B The problem of key exchange
algorithm is what? C They are slower than asymmetric
D The problem of generating keys -
A RSA ANSWER -B
B Vigenere
C DES
D Caesar Cipher - ANSWER -A Which of the following is generally true about
block sizes?

Original, unencrypted information is referred A Smaller block sizes increase security
to as ____. B Block sizes must be more than 256 bits to
be secure
A text C Block size is irrelevant to security
B plaintext D Larger block sizes increase security -
C cleantext ANSWER -D
D ciphertext - ANSWER -B

A _____ is a function that takes a variable-size
Which of the following is NOT an asymmetric input m and returns a fixed-size string.
system?
A Symmetric cipher
A PGP B Hash
B RSA C Asymmetric cipher
C SSL D Feistel - ANSWER -B
D DES - ANSWER -D

Which of the following is a cryptographic
In order for User A to send User B an protocol that allows two parties to establish a
encrypted message that only User B can shared key over an insecure channel?
read, User A must encrypt message with
which of the following keys? A Elliptic Curve
B RSA
A User A's public key C MD5


, WGU Course C839 - Intro to Cryptography with Complete Solutions

D Diffie-Hellman - ANSWER -D
A Vigenere
B Caesar
A _________ is a digital representation of C Atbash
information that identifies you as a relevant D Scytale - ANSWER -A
entity by a trusted third party?

A Digital Signature Which of the following is a substitution cipher
B Hash used by ancient Hebrew scholars?
C Ownership stamp
D Digest - ANSWER -A A Caesar
B Vigenere
C Scytale
What is the standard used by most digital D Atbash - ANSWER -D
certificates?

A X.509 Shifting each letter in the alphabet a fixed
B CRL number of spaces to the right or left is an
C RFC 2298 example of what?
D OCSP - ANSWER -A
A Bit shifting
B Confusion
DES uses keys of what size? C Multi substitution
D Single substitution - ANSWER -D
A 56 bits
B 192 bits
C 128 bits Which of the following most accurately
D 64 bits - ANSWER -A defines encryption?

A changing a message so it can only be easily
Which of the following is NOT a key size used read by the intended recipient
by AES?
B Making binary changes to a message to
A 512 bits conceal it
B 128 bits
C 192 bits C changing a message using complex
D 256 bits - ANSWER -A mathematics

D Applying keys to plain text -
Which of the following was a multi alphabet ANSWER -A
cipher widely used from the 16th century
(1553) to the early 20th century (1900s)?


, WGU Course C839 - Intro to Cryptography with Complete Solutions

If you use substitution alone, what weakness
is present in the resulting cipher text? A Electronic codebook (ECB)
B Cipher-block chaining (CBC)
A It is the same length as the original text C Cipher feedback (CFB)
B It is easily broken with modern computers. D Output feedback (OFB) - ANSWER -A
C It is too simple.
D Because it maintains letter and word
frequency. - ANSWER -D Which of the following is an example of an
unbalanced Feistel?

_____ uses at least two different shifts, A 3DES
changing the shift with different letters in the B Skipjack
plain text. C Twofish
D AES - ANSWER -B
A Atbash
B multi-alphabet encryption
C Scytale This process is done by having each block of
D Caesar cipher - ANSWER -B plaintext is XORed with the previous
ciphertext block before being encrypted.

____ was designed to provide built in A Output feedback (OFB)
cryptography for the clipper chip. B Cipher-block chaining (CBC)
C Electronic codebook (ECB)
A Blowfish D Cipher feedback (CFB) - ANSWER -B
B Skipjack
C GOST
D 3DES - ANSWER -B The process wherein the ciphertext block is
encrypted then the ciphertext produced is
XOR'd back with the plaintext to produce the
Which of the following uses an 80 bit key on current ciphertext block is called what?
64 bit blocks?
A Output feedback (OFB)
A Twofish B Cipher-block chaining (CBC)
B AES C Cipher feedback (CFB)
C Skipjack D Electronic codebook (ECB) -
D DES - ANSWER -C ANSWER -C


With _____, the message is divided into This is a method for turning a block cipher
blocks and each block is encrypted into a stream cipher by generating a
separately. This is the most basic mode for keystream block, which are then XORed with
symmetric encryption. the plaintext blocks to get the ciphertext.
$13.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
MERCYTRISHIA Howard Community College
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
184
Miembro desde
1 año
Número de seguidores
35
Documentos
10820
Última venta
5 días hace
MercyTrishia

On this page, you find all documents, package deals offered by seller MercyTrishia

3.8

37 reseñas

5
16
4
7
3
10
2
0
1
4

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes