) Introduction to Cryptography
Questions with Answers {Grade A} 100%
Correct (Verified Answers) - WGU
Large volumes of plaintext need to be encrypted, and the encryption keys need to be
securely distributed. Which approach should be used for encryption and distribution?
A. Encrypt by using symmetric keys and distribute by using asymmetric keys
B. Encrypt by using asymmetric keys and distribute by using symmetric keys
C. Encrypt by using symmetric keys and distribute by using symmetric keys
D. Encrypt by using asymmetric keys and distribute by using asymmetric keys -
correct answer Encrypt by using symmetric keys and distribute by using asymmetric
keys
What is the role of a key in asymmetric encryption and decryption?
A. A public key is used for both encryption and decryption.
B. A private key is used for both encryption and decryption.
C. A public key is used for encryption, and a private key is used for decryption.
D. A private key is used for encryption, and a public key is used for decryption. -
correct answer A public key is used for encryption, and a private key is used for
decryption.
A security analyst is validating the integrity and authenticity of a data transaction.
Which PKI component is being used?
, D 334 Pre-Assessment (Latest Update
) Introduction to Cryptography
Questions with Answers {Grade A} 100%
Correct (Verified Answers) - WGU
A. Digital - correct answer
B. Digital signature
C. Asymmetric encryption
D. Symmetric encryption - correct answer Digital signature
Which PKI component generates digital - correct answer s?
A. - correct answer signing request (CSR)
B. - correct answer policy (CP)
C. - correct answer revocation list (CRL)
D. - correct answer authority (CA) - correct answer - correct answer authority (CA)
What is the maximum length (in bits) of encryption keys used by the WEP protocol?
A. 40
B. 56
C. 128
D. 256 - correct answer 40
What is a difference between WPA-Enterprise and WPA-Personal?
A. Support for Temporal Key Integrity Protocol
B. Support for an authentication server
, D 334 Pre-Assessment (Latest Update
) Introduction to Cryptography
Questions with Answers {Grade A} 100%
Correct (Verified Answers) - WGU
C. Use of a session key
D. Use of a 48-bit initialization vector - correct answer Support for an authentication
server
Which cipher is used with WEP?
A. RC5
B. RC4
C. TKIP
D. AES - correct answer RC4
How does TKIP improve WPA over WEP?
A. Hashes the initialization vector and secret key
B. Implements a RADIUS server
C. Implements an authentication server
D. Creates an AES encryption key - correct answer Hashes the initialization vector and
secret key
An administrator has configured a virtual private network (VPN) connection utilizing
IPsec tunnel mode with Encapsulating Security Payload (ESP) between the corporate
office and a remote office. Where can the packets be inspected by intrusion detection
systems (IDSs) and virus scanners?