Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

WGU Introduction-to-Cryptography Dumps

WGU Introduction to Cryptography HNO1 Questions and Answers

Question 1

(What is the correlation between the number of rounds and the key length used in the AES algorithm?)

Options:

A.

The number of rounds decreases as the key length increases.

B.

The number of rounds increases as the key length increases.

C.

The key length is the same regardless of the number of rounds.

D.

The number of rounds is the same regardless of the key length.

Question 2

(How is Public Key Infrastructure (PKI) commonly utilized in web browsers?)

Options:

A.

To compress encrypted messages for storage

B.

To authenticate users during data transmission

C.

To securely manage digital certificates and keys

D.

To encrypt data at rest

Question 3

(An organization wants to digitally sign its software to guarantee the integrity of its source code. Which key should the customer use to decrypt the digest of the source code?)

Options:

A.

Customer’s private key

B.

Organization’s public key

C.

Organization’s private key

D.

Customer’s public key

Question 4

(Which mechanism can be applied to protect the integrity of plaintext when using AES?)

Options:

A.

RC4

B.

Message Authentication Code (MAC)

C.

RSA

D.

Kerberos key sharing

Question 5

(Which encryption mode is known for supporting parallel processing?)

Options:

A.

Cipher Feedback (CFB)

B.

Cipher Block Chaining (CBC)

C.

Output Feedback (OFB)

D.

Electronic Codebook (ECB)

Question 6

(A security analyst is using 3DES for data encryption. Which 3DES key size is valid?)

Options:

A.

128-bit

B.

2,048-bit

C.

56-bit

D.

112-bit

Question 7

(What is modular arithmetic in cryptography?)

Options:

A.

The process of encoding messages using large integers

B.

A method of encrypting messages using modular operations

C.

The study of secret codes

D.

The art of deciphering messages using prime numbers

Question 8

(Which default port must be allowed by firewalls for the key exchange of the IPsec handshaking process to be successful?)

Options:

A.

TCP 443

B.

UDP 443

C.

TCP 500

D.

UDP 500

Question 9

(What is a component of a one-time password (OTP) that is needed to guess future iterations of passwords?)

Options:

A.

Function

B.

Initialization vector

C.

Encryption algorithm

D.

Seed

Question 10

(Which encryption algorithm uses an 80-bit key and operates on 64-bit data blocks?)

Options:

A.

Twofish

B.

Blowfish

C.

Camellia

D.

Skipjack

Question 11

(How often are transactions added to a blockchain?)

Options:

A.

Approximately every 10 minutes

B.

Approximately every 30 minutes

C.

Approximately every 1 hour

D.

Approximately every 24 hours

Question 12

(What is the value of 51 mod 11?)

Options:

A.

04

B.

05

C.

07

D.

11

Question 13

(Two people want to communicate through secure email. The person creating the email wants to ensure only their friend can decrypt the email. Which key should the person creating the email use to encrypt the message?)

Options:

A.

Sender’s public key

B.

Recipient’s private key

C.

Sender’s private key

D.

Recipient’s public key

Question 14

(How does a cryptographic policy contribute to incident response?)

Options:

A.

By providing guidelines for secure data recovery and communication

B.

By limiting the use of encryption tools during incidents

C.

By slowing down the incident resolution process

D.

By increasing the likelihood of data breaches

Question 15

(Why did the National Institute of Standards and Technology (NIST) choose Ascon for lightweight cryptography?)

Options:

A.

To authenticate users during data transmission

B.

To ensure compatibility with legacy systems

C.

To provide a secure and efficient encryption solution for resource-constrained devices

D.

To encrypt data at rest

Question 16

(What are the primary characteristics of Bitcoin proof of work?)

Options:

A.

Difficult to produce and difficult to verify

B.

Difficult to produce and easy to verify

C.

Easy to produce and easy to verify

D.

Easy to produce and difficult to verify

Question 17

(Employee A needs to send Employee B a symmetric key for confidential communication. Which key is used to encrypt the symmetric key?)

Options:

A.

Employee A’s private key

B.

Employee B’s public key

C.

Employee A’s public key

D.

Employee B’s private key

Question 18

(Which is an example of asymmetric encryption?)

Options:

A.

Secure Hash Algorithm 256 (SHA-256)

B.

Hash-based Message Authentication Code (HMAC)

C.

Data Encryption Standard (DES)

D.

Elliptic-Curve Cryptography (ECC)

Question 19

(Which mechanism implemented in WPA-Enterprise guards against bit-flipping exploits?)

Options:

A.

Advanced Encryption Standard (AES)

B.

Pre-shared key (PSK)

C.

Message Integrity Check (MIC)

D.

Global encryption key

Question 20

(Which cryptographic technique is used to ensure data integrity?)

Options:

A.

Authentication

B.

Non-repudiation

C.

Digital signatures

D.

Steganography

Question 21

(Which certificate encoding process is binary-based?)

Options:

A.

Public Key Infrastructure (PKI)

B.

Distinguished Encoding Rules (DER)

C.

Rivest–Shamir–Adleman (RSA)

D.

Privacy Enhanced Mail (PEM)

Question 22

(Which mode of encryption uses an Initialization Vector (IV) to encrypt the first block and then uses the result to encrypt the next block?)

Options:

A.

Electronic Codebook (ECB)

B.

Cipher Block Chaining (CBC)

C.

Output Feedback (OFB)

D.

Cipher Feedback (CFB)

Question 23

(Which lesson can be learned from organizations that experience breaches due to poor cryptographic practices?)

Options:

A.

Comprehensive risk assessments are vital for identifying potential vulnerabilities.

B.

Employee training is not relevant for preventing breaches.

C.

Regular audits and updates are unnecessary.

D.

Security measures should be secondary to business objectives.

Question 24

(What describes a true random number generator?)

Options:

A.

Fast and deterministic, and the same input produces the same results

B.

Slow and nondeterministic, and the same input produces different results

C.

Unique integer determined through factorization of integers

D.

Integer increased by one to match requests and responses

Question 25

(What is the significance of the Nobody But Us (NOBUS) principle in cryptography?)

Options:

A.

It refers to a cryptographic key that can be accessed by anyone.

B.

It denotes a cryptographic algorithm with known weaknesses.

C.

It represents a widely used encryption standard.

D.

It indicates that a vulnerability is so difficult to exploit that only the entity that created it can exploit it.

Question 26

(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)

Options:

A.

Privacy Enhanced Mail (PEM)

B.

Online Certificate Status Protocol (OCSP)

C.

Root Certificate Authority (CA)

D.

Policy Certificate Authority (CA)

Question 27

(What is a key benefit of using a cryptography framework?)

Options:

A.

It guarantees complete security against all attacks.

B.

It removes the need for employee training in security.

C.

It is solely focused on regulatory compliance.

D.

It provides a structured approach to implementing encryption practices.

Page: 1 / 9
Total 93 questions