Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium WGU Introduction-to-Cryptography Dumps Questions Answers

WGU Introduction to Cryptography HNO1 Questions and Answers

Question 1

(What is used to randomize the initial value when generating Initialization Vectors (IVs)?)

Options:

A.

Key

B.

Plaintext

C.

Algorithm

D.

Nonce

Buy Now
Question 2

(What is the maximum key size (in bits) supported by AES?)

Options:

A.

128

B.

192

C.

256

D.

512

Question 3

(Which type of network were VPN connections originally designed to tunnel through?)

Options:

A.

Encrypted

B.

Protected

C.

Public

D.

Private

Question 4

(What is the value of 23 mod 6?)

Options:

A.

03

B.

04

C.

05

D.

06

Question 5

(What makes the RC4 cipher unique compared to RC5 and RC6?)

Options:

A.

Stream

B.

Asymmetric

C.

Symmetric

D.

Block

Question 6

(Which authentication method allows a customer to authenticate to a web service?)

Options:

A.

One-way server authentication

B.

End-to-end authentication

C.

Mutual authentication

D.

One-way client authentication

Question 7

(A security analyst is using 3DES for data encryption. Which 3DES key size is valid?)

Options:

A.

128-bit

B.

2,048-bit

C.

56-bit

D.

112-bit

Question 8

(A security engineer is implementing device authentication as a form of two-factor authentication in a Public Key Infrastructure (PKI) environment. What should be used as a second form of authentication?)

Options:

A.

Symmetric encryption

B.

Digital certificate

C.

Asymmetric encryption

D.

Digital signature

Question 9

(Which component is used to verify the integrity of a message?)

Options:

A.

TKIP

B.

HMAC

C.

AES

D.

IV

Question 10

(Which mechanism can be applied to protect the integrity of plaintext when using AES?)

Options:

A.

RC4

B.

Message Authentication Code (MAC)

C.

RSA

D.

Kerberos key sharing

Question 11

(Which symmetric encryption technique uses a 256-bit key size and a 128-bit block size?)

Options:

A.

3DES

B.

DES

C.

IDEA

D.

AES

Question 12

(What type of encryption uses different keys to encrypt and decrypt the message?)

Options:

A.

Symmetric

B.

Private key

C.

Secure

D.

Asymmetric

Question 13

(A Linux user password is identified as follows:

$2a$08$AbCh0RCM8p8FGaYvRLI0H.Kng54gcnWCOQYIhas708UEZRQQjGBh4

Which hash algorithm should be used to salt this password?)

Options:

A.

NTLM

B.

SHA-512

C.

MD5

D.

bcrypt

Question 14

(How are limits managed for the number of bitcoins that can be created and stored in a blockchain?)

Options:

A.

Rewards for mining reduce over time

B.

The total number of participants has been set

C.

A maximum has been established per country

D.

Each person has a maximum number

Question 15

(Which mechanism implemented in WPA-Enterprise guards against bit-flipping exploits?)

Options:

A.

Advanced Encryption Standard (AES)

B.

Pre-shared key (PSK)

C.

Message Integrity Check (MIC)

D.

Global encryption key

Question 16

(Which attack may take the longest amount of time to achieve success?)

Options:

A.

Birthday

B.

Rainbow table

C.

Dictionary

D.

Brute-force

Question 17

(Which encryption algorithm uses an 80-bit key and operates on 64-bit data blocks?)

Options:

A.

Twofish

B.

Blowfish

C.

Camellia

D.

Skipjack

Question 18

(What are the primary characteristics of Bitcoin proof of work?)

Options:

A.

Difficult to produce and difficult to verify

B.

Difficult to produce and easy to verify

C.

Easy to produce and easy to verify

D.

Easy to produce and difficult to verify