Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

WGU Introduction-to-Cryptography WGU Introduction to Cryptography HNO1 Exam Practice Test

WGU Introduction to Cryptography HNO1 Questions and Answers

Question 1

(What is the length of the Initialization Vector (IV) in WEP?)

Options:

A.

24 bits

B.

40 bits

C.

48 bits

D.

56 bits

Question 2

(Which mechanism can be applied to protect the integrity of plaintext when using AES?)

Options:

A.

RC4

B.

Message Authentication Code (MAC)

C.

RSA

D.

Kerberos key sharing

Question 3

(Which type of network were VPN connections originally designed to tunnel through?)

Options:

A.

Encrypted

B.

Protected

C.

Public

D.

Private

Question 4

(What type of encryption uses different keys to encrypt and decrypt the message?)

Options:

A.

Symmetric

B.

Private key

C.

Secure

D.

Asymmetric

Question 5

(Why should an asymmetric private key be used to encrypt the digest of an application?)

Options:

A.

An asymmetric private key uses the same key to encrypt and decrypt large amounts of media, one bit at a time.

B.

An asymmetric private key signs files by signing (encrypting) the hash of a file so integrity and authenticity can be verified with the corresponding public key.

C.

An asymmetric private key encrypts and decrypts data in blocks of characters at a time with a complex algorithm.

D.

An asymmetric private key encrypts a small amount of information, which is decrypted with the corresponding private key.

Question 6

(An administrator has configured a Virtual Private Network (VPN) connection utilizing IPsec transport mode with Encapsulating Security Payload (ESP) between a server in the corporate office and a client computer in the remote office. In which situation can the packet content be inspected?)

Options:

A.

On devices at headquarters and offsite before being sent and after being received

B.

In the headquarters’ and offsite location’s networks after the data has been sent

C.

Only in the offsite location’s network while data is in transit

D.

Only in the headquarters’ network while data is in transit

Question 7

(Which operation can be performed on a certificate during the “Issued” stage?)

Options:

A.

Creation

B.

Key recovery

C.

Distribution

D.

Key archiving

Question 8

(What is the value of 23 mod 6?)

Options:

A.

03

B.

04

C.

05

D.

06

Question 9

(Which wireless security standard uses an authentication server with 802.1X and EAP?)

Options:

A.

WPA-PSK

B.

WEP

C.

WPA-Enterprise

D.

TKIP

Question 10

(Which cryptographic operation uses a single key?)

Options:

A.

Hashing

B.

Asymmetric

C.

Padding

D.

Symmetric

Question 11

(Which attack may take the longest amount of time to achieve success?)

Options:

A.

Birthday

B.

Rainbow table

C.

Dictionary

D.

Brute-force

Question 12

(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)

Options:

A.

Privacy Enhanced Mail (PEM)

B.

Online Certificate Status Protocol (OCSP)

C.

Root Certificate Authority (CA)

D.

Policy Certificate Authority (CA)

Question 13

(Which symmetric encryption technique uses a 112-bit key size and a 64-bit block size?)

Options:

A.

AES

B.

3DES

C.

DES

D.

IDEA

Question 14

(Which certificate encoding process is binary-based?)

Options:

A.

Public Key Infrastructure (PKI)

B.

Distinguished Encoding Rules (DER)

C.

Rivest–Shamir–Adleman (RSA)

D.

Privacy Enhanced Mail (PEM)

Question 15

(Which technique involves spotting variations in encrypted data and plotting how the characters relate to standard English characters?)

Options:

A.

Brute force

B.

Frequency analysis

C.

Known plaintext

D.

Chosen ciphertext

Question 16

(Which type of exploit involves looking for different inputs that generate the same hash?)

Options:

A.

Birthday attack

B.

Linear cryptanalysis

C.

Algebraic attack

D.

Differential cryptanalysis

Question 17

(Employee A needs to send Employee B a symmetric key for confidential communication. Which key is used to encrypt the symmetric key?)

Options:

A.

Employee A’s private key

B.

Employee B’s public key

C.

Employee A’s public key

D.

Employee B’s private key

Question 18

(Which encryption algorithm encrypts with one key, decrypts with another key, and then encrypts with the first key?)

Options:

A.

IDEA

B.

AES

C.

3DES

D.

DES