Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > WGU > Courses and Certificates > Introduction-to-Cryptography

Introduction-to-Cryptography WGU Introduction to Cryptography HNO1 Question and Answers

Question # 4

(How does adding salt to a password improve security?)

A.

Salt creates a different hash if two people use the same password.

B.

Salt enforces the complexity rules for passwords.

C.

Salt ensures two people do not have the same password.

D.

Salt prevents users from reusing the same password.

Full Access
Question # 5

(What is the value of 51 mod 11?)

A.

04

B.

05

C.

07

D.

11

Full Access
Question # 6

(A company wants to use certificates issued by a root CA to demonstrate to customers that it is a legitimate company being hosted by a cloud provider. Who needs to trust the root CA public key?)

A.

The seller and the buyer

B.

The cloud provider and the seller

C.

The Federal Trade Commission and the cloud provider

D.

The buyer and the Federal Trade Commission

Full Access
Question # 7

(Which operation can be performed on a certificate during the “Issued” stage?)

A.

Creation

B.

Key recovery

C.

Distribution

D.

Key archiving

Full Access
Question # 8

(What is a component of a one-time password (OTP) that is needed to guess future iterations of passwords?)

A.

Function

B.

Initialization vector

C.

Encryption algorithm

D.

Seed

Full Access
Question # 9

(What is the maximum key size (in bits) supported by AES?)

A.

128

B.

192

C.

256

D.

512

Full Access
Question # 10

(Which cryptographic operation uses a single key?)

A.

Hashing

B.

Asymmetric

C.

Padding

D.

Symmetric

Full Access
Question # 11

(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)

A.

Privacy Enhanced Mail (PEM)

B.

Online Certificate Status Protocol (OCSP)

C.

Root Certificate Authority (CA)

D.

Policy Certificate Authority (CA)

Full Access
Question # 12

(What is the length of the Initialization Vector (IV) in WEP?)

A.

24 bits

B.

40 bits

C.

48 bits

D.

56 bits

Full Access
Question # 13

(What describes a true random number generator?)

A.

Fast and deterministic, and the same input produces the same results

B.

Slow and nondeterministic, and the same input produces different results

C.

Unique integer determined through factorization of integers

D.

Integer increased by one to match requests and responses

Full Access
Question # 14

(How does Electronic Codebook (ECB) mode encryption function?)

A.

Converts from block to stream, then uses a counter value and a nonce to encrypt the data

B.

Uses a self-synchronizing stream on the blocks, where the IV is encrypted and XORed with the data stream

C.

Uses an IV to encrypt the first block, then uses the result to encrypt the next block

D.

Encrypts each block with the same key, where each block is independent of the others

Full Access
Question # 15

(Two people want to communicate through secure email. The person creating the email wants to ensure only their friend can decrypt the email. Which key should the person creating the email use to encrypt the message?)

A.

Sender’s public key

B.

Recipient’s private key

C.

Sender’s private key

D.

Recipient’s public key

Full Access
Question # 16

(What makes the RC4 cipher unique compared to RC5 and RC6?)

A.

Stream

B.

Asymmetric

C.

Symmetric

D.

Block

Full Access
Question # 17

(Which default port must be allowed by firewalls for the key exchange of the IPsec handshaking process to be successful?)

A.

TCP 443

B.

UDP 443

C.

TCP 500

D.

UDP 500

Full Access
Question # 18

(Which symmetric encryption technique uses a 256-bit key size and a 128-bit block size?)

A.

3DES

B.

DES

C.

IDEA

D.

AES

Full Access