Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU Course C839 - Intro to Cryptography with Complete Solutions

Beoordeling
-
Verkocht
-
Pagina's
30
Cijfer
A+
Geüpload op
21-07-2025
Geschreven in
2024/2025

1 / 30 WGU Course C839 - Intro to Cryptography with Complete Solutions What type of encryption uses different keys to encrypt and decrypt the message? A Symmetric B Private key C Secure D Asymmetric - ANSWER -D The most widely used asymmetric encryption algorithm is what? A RSA B Vigenere C DES D Caesar Cipher - ANSWER -A Original, unencrypted information is referred to as __

Meer zien Lees minder
Instelling
WGU Course C839 - Intro To Cryptography
Vak
WGU Course C839 - Intro to Cryptography

Voorbeeld van de inhoud

WGU Course C839 - Intro to Cryptography with Complete Solutions

What type of encryption uses different keys B User A's private key
to encrypt and decrypt the message? C User B's public key
D User B's private key - ANSWER -C
A Symmetric
B Private key
C Secure The greatest weakness with symmetric
D Asymmetric - ANSWER -D algorithms is _____.

A They are less secure than asymmetric
The most widely used asymmetric encryption B The problem of key exchange
algorithm is what? C They are slower than asymmetric
D The problem of generating keys -
A RSA ANSWER -B
B Vigenere
C DES
D Caesar Cipher - ANSWER -A Which of the following is generally true about
block sizes?

Original, unencrypted information is referred A Smaller block sizes increase security
to as ____. B Block sizes must be more than 256 bits to
be secure
A text C Block size is irrelevant to security
B plaintext D Larger block sizes increase security -
C cleantext ANSWER -D
D ciphertext - ANSWER -B

A _____ is a function that takes a variable-size
Which of the following is NOT an asymmetric input m and returns a fixed-size string.
system?
A Symmetric cipher
A PGP B Hash
B RSA C Asymmetric cipher
C SSL D Feistel - ANSWER -B
D DES - ANSWER -D

Which of the following is a cryptographic
In order for User A to send User B an protocol that allows two parties to establish a
encrypted message that only User B can shared key over an insecure channel?
read, User A must encrypt message with
which of the following keys? A Elliptic Curve
B RSA
A User A's public key C MD5


, WGU Course C839 - Intro to Cryptography with Complete Solutions

D Diffie-Hellman - ANSWER -D
A Vigenere
B Caesar
A _________ is a digital representation of C Atbash
information that identifies you as a relevant D Scytale - ANSWER -A
entity by a trusted third party?

A Digital Signature Which of the following is a substitution cipher
B Hash used by ancient Hebrew scholars?
C Ownership stamp
D Digest - ANSWER -A A Caesar
B Vigenere
C Scytale
What is the standard used by most digital D Atbash - ANSWER -D
certificates?

A X.509 Shifting each letter in the alphabet a fixed
B CRL number of spaces to the right or left is an
C RFC 2298 example of what?
D OCSP - ANSWER -A
A Bit shifting
B Confusion
DES uses keys of what size? C Multi substitution
D Single substitution - ANSWER -D
A 56 bits
B 192 bits
C 128 bits Which of the following most accurately
D 64 bits - ANSWER -A defines encryption?

A changing a message so it can only be easily
Which of the following is NOT a key size used read by the intended recipient
by AES?
B Making binary changes to a message to
A 512 bits conceal it
B 128 bits
C 192 bits C changing a message using complex
D 256 bits - ANSWER -A mathematics

D Applying keys to plain text -
Which of the following was a multi alphabet ANSWER -A
cipher widely used from the 16th century
(1553) to the early 20th century (1900s)?


, WGU Course C839 - Intro to Cryptography with Complete Solutions

If you use substitution alone, what weakness
is present in the resulting cipher text? A Electronic codebook (ECB)
B Cipher-block chaining (CBC)
A It is the same length as the original text C Cipher feedback (CFB)
B It is easily broken with modern computers. D Output feedback (OFB) - ANSWER -A
C It is too simple.
D Because it maintains letter and word
frequency. - ANSWER -D Which of the following is an example of an
unbalanced Feistel?

_____ uses at least two different shifts, A 3DES
changing the shift with different letters in the B Skipjack
plain text. C Twofish
D AES - ANSWER -B
A Atbash
B multi-alphabet encryption
C Scytale This process is done by having each block of
D Caesar cipher - ANSWER -B plaintext is XORed with the previous
ciphertext block before being encrypted.

____ was designed to provide built in A Output feedback (OFB)
cryptography for the clipper chip. B Cipher-block chaining (CBC)
C Electronic codebook (ECB)
A Blowfish D Cipher feedback (CFB) - ANSWER -B
B Skipjack
C GOST
D 3DES - ANSWER -B The process wherein the ciphertext block is
encrypted then the ciphertext produced is
XOR'd back with the plaintext to produce the
Which of the following uses an 80 bit key on current ciphertext block is called what?
64 bit blocks?
A Output feedback (OFB)
A Twofish B Cipher-block chaining (CBC)
B AES C Cipher feedback (CFB)
C Skipjack D Electronic codebook (ECB) -
D DES - ANSWER -C ANSWER -C


With _____, the message is divided into This is a method for turning a block cipher
blocks and each block is encrypted into a stream cipher by generating a
separately. This is the most basic mode for keystream block, which are then XORed with
symmetric encryption. the plaintext blocks to get the ciphertext.

Geschreven voor

Instelling
WGU Course C839 - Intro to Cryptography
Vak
WGU Course C839 - Intro to Cryptography

Documentinformatie

Geüpload op
21 juli 2025
Aantal pagina's
30
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€12,48
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
MERCYTRISHIA Howard Community College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
199
Lid sinds
1 jaar
Aantal volgers
35
Documenten
12411
Laatst verkocht
13 uur geleden
MercyTrishia

On this page, you find all documents, package deals offered by seller MercyTrishia

3,9

40 beoordelingen

5
18
4
7
3
11
2
0
1
4

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen