Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

WGU Introduction-to-Cryptography Dumps

WGU Introduction to Cryptography HNO1 Questions and Answers

Question 1

(What is the length of the Initialization Vector (IV) in WEP?)

Options:

A.

24 bits

B.

40 bits

C.

48 bits

D.

56 bits

Question 2

(Which number of bits gets encrypted each time encryption is applied during stream encryption?)

Options:

A.

1

B.

40

C.

192

D.

256

Question 3

(Employee A needs to send Employee B a symmetric key for confidential communication. Which key is used to encrypt the symmetric key?)

Options:

A.

Employee A’s private key

B.

Employee B’s public key

C.

Employee A’s public key

D.

Employee B’s private key

Question 4

(What makes the RC4 cipher unique compared to RC5 and RC6?)

Options:

A.

Stream

B.

Asymmetric

C.

Symmetric

D.

Block

Question 5

(Which component is used to verify the integrity of a message?)

Options:

A.

TKIP

B.

HMAC

C.

AES

D.

IV

Question 6

(What is used to randomize the initial value when generating Initialization Vectors (IVs)?)

Options:

A.

Key

B.

Plaintext

C.

Algorithm

D.

Nonce

Question 7

(What is the maximum key size (in bits) supported by AES?)

Options:

A.

128

B.

192

C.

256

D.

512

Question 8

(Why should a forensic investigator create a hash of a victim’s hard drive and of the bitstream copy of the hard drive?)

Options:

A.

To identify if someone opened the drive

B.

To certify the information on the drive is correct

C.

To establish who created the files on the drives

D.

To verify that the drives are identical

Question 9

(Which technique involves spotting variations in encrypted data and plotting how the characters relate to standard English characters?)

Options:

A.

Brute force

B.

Frequency analysis

C.

Known plaintext

D.

Chosen ciphertext

Question 10

(Which encryption process sends a list of cipher suites that are supported for encrypted communications?)

Options:

A.

Forward secrecy

B.

ServerHello

C.

ClientHello

D.

Integrity check

Question 11

(An organization wants to digitally sign its software to guarantee the integrity of its source code. Which key should the customer use to decrypt the digest of the source code?)

Options:

A.

Customer’s private key

B.

Organization’s public key

C.

Organization’s private key

D.

Customer’s public key

Question 12

(Two people want to communicate through secure email. The person creating the email wants to ensure only their friend can decrypt the email. Which key should the person creating the email use to encrypt the message?)

Options:

A.

Sender’s public key

B.

Recipient’s private key

C.

Sender’s private key

D.

Recipient’s public key

Question 13

(Which certificate encoding process is binary-based?)

Options:

A.

Public Key Infrastructure (PKI)

B.

Distinguished Encoding Rules (DER)

C.

Rivest–Shamir–Adleman (RSA)

D.

Privacy Enhanced Mail (PEM)

Question 14

(Which mechanism can be applied to protect the integrity of plaintext when using AES?)

Options:

A.

RC4

B.

Message Authentication Code (MAC)

C.

RSA

D.

Kerberos key sharing

Question 15

(What is the RC4 encryption key size when utilizing WPA with Temporal Key Integrity Protocol (TKIP)?)

Options:

A.

40 bits

B.

56 bits

C.

128 bits

D.

256 bits

Question 16

(Which type of exploit involves looking for different inputs that generate the same hash?)

Options:

A.

Birthday attack

B.

Linear cryptanalysis

C.

Algebraic attack

D.

Differential cryptanalysis

Question 17

(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)

Options:

A.

Privacy Enhanced Mail (PEM)

B.

Online Certificate Status Protocol (OCSP)

C.

Root Certificate Authority (CA)

D.

Policy Certificate Authority (CA)

Question 18

(A Linux user password is identified as follows:

$2a$08$AbCh0RCM8p8FGaYvRLI0H.Kng54gcnWCOQYIhas708UEZRQQjGBh4

Which hash algorithm should be used to salt this password?)

Options:

A.

NTLM

B.

SHA-512

C.

MD5

D.

bcrypt

Page: 1 / 6
Total 60 questions