WGU D334 Introduction to Cryptography Performance
Assessment Study Pack – Complete Set of 115 Questions And
Detailed Answers for Exam Preparation
Ascorers Stuvia
This Document Consists Of:
WGU D334 Introduction to Cryptography
Questions And Answers
100% Guaranteed Pass
Complete A+ Guide
, WGU D334 Introduction to Cryptography Performance
Assessment Study Pack – Complete Set of 115 Questions and
Detailed Answers for Exam Preparation
1. Which encryption algorithm is the preferred symmetrical algorithm that is
intended to replace 3DES?
DES
DSA
SHA256
AES
MD5
RSA
2. Which of the wireless encryption protocols uses the RC4 symmetric
algorithm for encrypting wireless communication?
WPA2
TLS
WEP
EAP
,3. If an organization needs to securely transfer a private key along with its
associated X.509 certificate to a partner organization, which standard
should they use?
RTF
Public Key Cryptography Standard (PKCS) #7
CER
Public Key Cryptography Standard (PKCS) #12
4. Describe the significance of the hash field in an X.509 certificate.
The hash field contains the public key of the issuer.
The hash field ensures the integrity of the certificate by allowing
verification that it has not been altered.
The hash field indicates the expiration date of the certificate.
The hash field lists the certificate's serial number.
5. Which encryption algorithm is specifically associated with WEP for
securing wireless networks?
DES
, 3DES
AES
RC4
6. What is the Kasiski examination used for in cryptography?
To encrypt messages using a symmetric key
To manage public key infrastructure
To determine the key length in a Vigenère cipher
To analyze the strength of a digital signature
7. Which of the following is a symmetric key cipher where the plaintext data
to be encrypted is done a bit at a time against the bits of the key stream,
also called a cipher digit stream?
Stream cipher
Block cipher
None of these answers is correct.
Asymmetric cipher
8. Describe the role of SHA-1 in the process of certificate validation.
SHA-1 is responsible for generating public and private keys.
SHA-1 is used to create a unique thumbprint that helps verify the
integrity of the certificate.
SHA-1 encrypts the certificate data to secure it from unauthorized
access.
SHA-1 manages the distribution of certificates through certificate
authorities.