and Answers 100% Correct {Grade A} -
WGU
Which of these is the strongest symmetric cryptographic algorithm?
a. Advanced Encryption Standard
b. RC1
c. Triple Data Encryption Standard
d. Data Encryption Standard - correct answer a. Advanced Encryption Standard
If Bob wants to send a secure message to Alice using an asymmetric cryptographic
algorithm, which key does he use to encrypt the message?
a. Alice's public key
b. Bob's public key
c. Alice's private key
d. Bob's private key - correct answer a. Alice's public key
Egor wanted to use a digital signature. Which of the following benefits will the digital
signature NOT provide?
a. Verify the receiver
b. Verify the sender
c. Enforce nonrepudiation
d. Prove the integrity of the message - correct answer a. Verify the receiver
, Module 06 Basic Cryptography Questions
and Answers 100% Correct {Grade A} -
WGU
Basil was reading about a new attack that forces the system to abandon a higher
cryptographic security mode of operation and instead fall back to an older and less
secure mode. What type of attack is this?
a. Deprecation attack
b. Downgrade attack
c. Obfuscation attack
d. Pullback attack - correct answer b. Downgrade attack
What is a collision?
a. Two ciphertexts have the same length.
b. Two algorithms have the same key.
c. Two files produce the same digest.
d. Two keys are the same length. - correct answer c. Two files produce the same
digest.
Which of the following is NOT a characteristic of the Trusted Platform Module (TPM)?
a. It can easily be transported to another computer.
b. It can generate asymmetric cryptographic public and private keys.
c. It includes a pseudorandom number generator (PRNG).
d. It provides cryptographic services in hardware instead of software - correct answer
c. It includes a pseudorandom number generator (PRNG).
Which of these provides cryptographic services and is external to the device?