{"id":114673,"date":"2023-08-22T10:07:27","date_gmt":"2023-08-22T10:07:27","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=114673"},"modified":"2023-08-22T10:07:29","modified_gmt":"2023-08-22T10:07:29","slug":"wgu-c839-intro-to-cryptography-exam-questions-and-answers-2023-2024-verified-answers","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/22\/wgu-c839-intro-to-cryptography-exam-questions-and-answers-2023-2024-verified-answers\/","title":{"rendered":"WGU C839 &#8211; Intro to Cryptography Exam Questions and Answers 2023 &#8211; 2024 (Verified Answers)"},"content":{"rendered":"\n<p>WGU C839 &#8211; Intro to Cryptography Exam<br>Questions and Answers<br>2023 &#8211; 2024 (Verified Answers)<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>What type of encryption uses different keys to encrypt and decrypt<br>the message?<br>A Symmetric<br>B Private<br>key C<br>Secure<br>D Asymmetric ANS D<\/li>\n\n\n\n<li>The most widely used asymmetric encryption algorithm is what?<br>A RSA<br>B<br>Vigenere<br>C DES<br>D Caesar Cipher ANS A<\/li>\n\n\n\n<li>Original, unencrypted information is referred to as .<\/li>\n<\/ol>\n\n\n\n<p>A text<br>B plaintext<br>C cleantext<br>D ciphertext ANS B<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Which of the following is NOT an asymmetric system?<br>A PGP<br>B RSA<br>C SSL<br>D DES ANS D<\/li>\n\n\n\n<li>In order for User A to send User B an encrypted message that only<br>User B can read, User A must encrypt message with which of the following<br>keys?<br>A User A&#8217;s public key<br>B User A&#8217;s private<br>key C User B&#8217;s public<br>key<br>D User B&#8217;s private key ANS C<\/li>\n\n\n\n<li>The greatest<br>weakness with symmetric algorithms is .<br>A They are less secure than asymmetric<br>B The problem of key exchange<\/li>\n<\/ol>\n\n\n\n<p>C They are slower than asymmetric<br>D The problem of generating keys<br>ANS B<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\">\n<li>Which of the following is generally true about block sizes?<br>A Smaller block sizes increase security<br>B Block sizes must be more than 256 bits to be<br>secure C Block size is irrelevant to security<br>D Larger block sizes increase security ANS D<\/li>\n\n\n\n<li>A is a function that takes a variable-size input m and<br>returns a fixed-size string.<br>A Symmetric cipher<br>B Hash<br>C Asymmetric cipher<br>D Feistel ANS B<\/li>\n\n\n\n<li>Which of the following is a cryptographic protocol that allows two<br>parties to establish a shared key over an insecure channel?<br>A Elliptic Curve<br>B RSA<br>C MD5<br>D Diffie-Hellman ANS D<\/li>\n\n\n\n<li>Ais a digital representation of information that identifies<\/li>\n<\/ol>\n\n\n\n<p>you as a relevant entity by a trusted third party?<br>A Digital Signature<br>B Hash<br>C Ownership<br>stamp D Digest<br>ANS A<br>11.What is the standard used by most digital certificates?<br>A X.509<br>B CRL<br>C RFC 2298<br>D OCSP<br>ANS A<br>12.DES uses keys of what size?<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C839 &#8211; Intro to Cryptography ExamQuestions and Answers2023 &#8211; 2024 (Verified Answers) A textB plaintextC cleantextD ciphertext ANS B C They are slower than asymmetricD The problem of generating keysANS B you as a relevant entity by a trusted third party?A Digital SignatureB HashC Ownershipstamp D DigestANS A11.What is the standard used by most [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-114673","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/114673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=114673"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/114673\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=114673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=114673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=114673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}