WGU C839 OBJECTIVE ASSESSMENT 2 LATEST VERSIONS (VERSION A & B) 2023-2024 /WGU C839
INTRODUCTION TO CRYPTOGRAPHY OA ACTUAL EXAM 350 QUESTIONS
Which encryption standard uses the same key to encrypt and decrypt messages? - (answer) Symmetric
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? - (answer)
Skipjack
What is the most commonly used format for certificates? - (answer) X.509 v3
What is referenced to determine if a certificate has been revoked? - (answer) Certificate revocation list
(CRL)
What needs to be installed on end users' computers to allow them to trust applications that have been
digitally signed by the developer? - (answer) Sender's public key
Which type of certificate must be certified by an authority to verify it with other participants? -
(answer) Public Certificate
What is an attribute of the Rivest Cipher 4 (RC4) algorithm? - (answer) It requires a unique nonce.
Which mode generates the key stream with a nonce and incrementing value? - (answer) Counter (CTR)
Which mode is a stream algorithm that concatenates an incrementing value with a nonce? - (answer)
Counter (CTR)
Which key would an administrator use to encrypt data so only the CEO can decrypt it? - (answer) CEO's
public key
What is the result of a hash function? - (answer) Digest
What is used to efficiently encrypt large files? - (answer) Symmetric encryption
, WGU C839 OBJECTIVE ASSESSMENT 2 LATEST VERSIONS (VERSION A & B) 2023-2024 /WGU C839
INTRODUCTION TO CRYPTOGRAPHY OA ACTUAL EXAM 350 QUESTIONS
An administrator needs to encrypt the following word with the Atbash cipher: security What is the
correct ciphertext? - (answer) hvxfirgb
Which cryptographic algorithm has a 128-bit hash size? - (answer) Message Digest Algorithm 5 (MD5)
Which characteristic makes a hashing function suitable for use in signature schemes? - (answer)
Collision resistance
Which attribute of a hashing function makes a birthday attack possible? - (answer) Partial-message
collision
Which hash algorithm produces a 160-bit output value? - (answer) SHA-1
What does cipher block chaining (CBC) use with the key to encrypt subsequent blocks of plaintext? -
(answer) Previous generated ciphertext
Which mode produces the same ciphertext from two identical plaintext blocks? - (answer) Electronic
codebook (ECB)
Which encryption mode is least secure? - (answer) Electronic codebook (ECB)
What is the mathematical formula used for symmetric decryption? - (answer) P = E (K,C)
Which algorithm relies on factoring the product of large prime numbers? - (answer) Rivest-Shamir-
Adleman
Which encryption technology is a serial combination of hashing, data compression, symmetric-key
cryptography, and public key infrastructure (PKI) and can be used for encrypting texts, emails, files, and
directories or for full disk encryption? - (answer) Pretty Good Privacy (PGP)
INTRODUCTION TO CRYPTOGRAPHY OA ACTUAL EXAM 350 QUESTIONS
Which encryption standard uses the same key to encrypt and decrypt messages? - (answer) Symmetric
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? - (answer)
Skipjack
What is the most commonly used format for certificates? - (answer) X.509 v3
What is referenced to determine if a certificate has been revoked? - (answer) Certificate revocation list
(CRL)
What needs to be installed on end users' computers to allow them to trust applications that have been
digitally signed by the developer? - (answer) Sender's public key
Which type of certificate must be certified by an authority to verify it with other participants? -
(answer) Public Certificate
What is an attribute of the Rivest Cipher 4 (RC4) algorithm? - (answer) It requires a unique nonce.
Which mode generates the key stream with a nonce and incrementing value? - (answer) Counter (CTR)
Which mode is a stream algorithm that concatenates an incrementing value with a nonce? - (answer)
Counter (CTR)
Which key would an administrator use to encrypt data so only the CEO can decrypt it? - (answer) CEO's
public key
What is the result of a hash function? - (answer) Digest
What is used to efficiently encrypt large files? - (answer) Symmetric encryption
, WGU C839 OBJECTIVE ASSESSMENT 2 LATEST VERSIONS (VERSION A & B) 2023-2024 /WGU C839
INTRODUCTION TO CRYPTOGRAPHY OA ACTUAL EXAM 350 QUESTIONS
An administrator needs to encrypt the following word with the Atbash cipher: security What is the
correct ciphertext? - (answer) hvxfirgb
Which cryptographic algorithm has a 128-bit hash size? - (answer) Message Digest Algorithm 5 (MD5)
Which characteristic makes a hashing function suitable for use in signature schemes? - (answer)
Collision resistance
Which attribute of a hashing function makes a birthday attack possible? - (answer) Partial-message
collision
Which hash algorithm produces a 160-bit output value? - (answer) SHA-1
What does cipher block chaining (CBC) use with the key to encrypt subsequent blocks of plaintext? -
(answer) Previous generated ciphertext
Which mode produces the same ciphertext from two identical plaintext blocks? - (answer) Electronic
codebook (ECB)
Which encryption mode is least secure? - (answer) Electronic codebook (ECB)
What is the mathematical formula used for symmetric decryption? - (answer) P = E (K,C)
Which algorithm relies on factoring the product of large prime numbers? - (answer) Rivest-Shamir-
Adleman
Which encryption technology is a serial combination of hashing, data compression, symmetric-key
cryptography, and public key infrastructure (PKI) and can be used for encrypting texts, emails, files, and
directories or for full disk encryption? - (answer) Pretty Good Privacy (PGP)