{"id":119508,"date":"2023-09-10T19:47:27","date_gmt":"2023-09-10T19:47:27","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=119508"},"modified":"2023-09-10T19:47:29","modified_gmt":"2023-09-10T19:47:29","slug":"wgu-c839-intro-to-cryptography-exam-study-bundle-2023-2024-complete-packageverified-wgu-c839-intro-to-cryptography-exam-study-bundle-2023-2024-complete-packageverified","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/09\/10\/wgu-c839-intro-to-cryptography-exam-study-bundle-2023-2024-complete-packageverified-wgu-c839-intro-to-cryptography-exam-study-bundle-2023-2024-complete-packageverified\/","title":{"rendered":"WGU C839 &#8211; Intro to Cryptography EXAM STUDY BUNDLE 2023 &#8211; 2024 (COMPLETE PACKAGE)(Verified)"},"content":{"rendered":"\n<p id=\"content-description\">WGU C839 &#8211; Intro to Cryptography EXAM STUDY BUNDLE 2023 &#8211; 2024 (COMPLETE PACKAGE)(Verified)<\/p>\n\n\n\n<p>WGU C839 Objective Assessment: Introduction to Cryptography 2023 \u2013 2024 (Verified Answers)<br>1.Which encryption standard uses the same key to encrypt and<br>decrypt messages ANS Symmetric Key Encryption<br>2.Which algorithm is designated as a Type 2 product by the National<br>Security Agency (NSA) ANS SKIPJACK<br>3.What is the most commonly used format for certificates ANS X.509 v3<br><em>Version 3<\/em><br>4.What is referenced to determine if a certificate has been revoked ANS<br>Certifi- cate Revocation List <em>(CRL)<\/em><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li>What needs to be installed on <em>end users&#8217; computers<\/em> to allow them to<br><em>trust<\/em> applications that have been <em>digitally signed<\/em> by the developer ANS -Sender&#8217;s public key <em>(DEVELOPER&#8217;s)<\/em><\/li>\n<\/ol>\n\n\n\n<p>6.Which type of certificate <em>must be certified by an authority<\/em> to verify it<br>with other participants ANS Public Certificate<br>7.What is an attribute of the Rivest Cipher 4 (RC4) algorithm ANS It<br>requires a unique nonce. <em>(# used ONCE)<\/em><br>8.Which mode generates the key stream with a nonce and<br>incrementing value ANS Counter (CTR)<br><em>Generates the next keystream block<\/em> by encrypting successive<br><em>values<\/em> of a &#8220;counter&#8221;<br>9.Which mode is a stream algorithm that concatenates an<br>incrementing value with a nonce ANS Counter (CTR)<br>10.Which key would an administrator use to encrypt data so <em>only the CEO can decrypt it?<\/em>: CEO&#8217;s public key<br>Remember, when a specific person in an organization is the <em>ONLY<\/em><br>one you want to <em>DECRYPT<\/em> something, you must have their <em>PUBLIC<\/em><br>key<\/p>\n\n\n\n<p>WGU C839 Objective Assessment 2023 &#8211; 2024<br>1.DES: 64 Bit Block &#8211; 56 Bit Key &#8211; 16 Rounds<br>2.AES: 128 Bit Block &#8211; 128, 192, 256 Bit Key &#8211; 10, 12, 14 Rounds<br>3.BlowFish: 64 Bit Block &#8211; 32 thru 448 Bit Key &#8211; 16 Rounds<br>4.TwoFish: 128 Bit Block &#8211; 1 thru 256 Bit Key &#8211; 16 Rounds<br>5.Serpent: 128 Bit Block 128, 192, 256 Bit Key &#8211; 32 Rounds<br>6.SkipJack: 64 Bit Block &#8211; 80 Bit Key &#8211; 32 Rounds<br>7.IDEA: 64 Bit Block &#8211; 128 Bit Key &#8211; 8.5 Rounds<br>8.Symmetric Block Ciphers: DES &#8211; AES &#8211; BlowFish &#8211; TwoFish &#8211;<br>Serpent &#8211; SkipJack &#8211; IDEA<br>9.Symmetric Block Ciphers with 64 Bit Block Size: DES &#8211; BlowFish &#8211;<br>SkipJack<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IDEA<br>10.Symmetric Block Ciphers with 128 Bit Block Size: AES &#8211; TwoFish &#8211;<\/li>\n<\/ul>\n\n\n\n<p>Serpent<br>11.Symmetric Block Ciphers with 128, 192, 256 Bit Key Size: AES &#8211; Serpent<br>12.Symmetric Block Ciphers with 16 Rounds: DES &#8211; BlowFish &#8211; TwoFish<br>13.Symmetric Block Ciphers with 32 Rounds: Serpent &#8211; SkipJack<br>14.RC4: 1 thru 2048 Bit Key Size &amp; 1 Round (40 bit minimum<br>recommended)<br>15.FISH: Uses Lagged Fibonacci pseudorandom number generator<br>16.PIKE: Revised version of FISH to address known plaintext attack<br>vulnerabilities<br>17.Symmetric Stream Ciphers: RC4 &#8211; Fish &#8211; Pike<br>18.Asymmetric Encryption Algos: RSA &#8211; ECC &#8211; El Gamal &#8211; DSA<br>19.RSA: Leverages prime number characteristics, 1024-4096 bit<br>variable key size, 1 round. Uses Trapdoor function to enable use for<br>encryption and digital signatures. One-way trapdoor functions can be<br>inverted with knowledge of trapdoor factorization information.<br>20.ECC: Leverages discrete logarithm characteristics<br>21.El Gamal: Used in recent versions of PGP<br><\/p>\n\n\n\n<p>1 \/ 20<br>WGU C839 Introduction to Cryptography &#8211; (EC-Council CES)<br>1.CrypTool: Software which allows encryption of text using historic<br>algorithms<br>2.The Enigma Machine: In World War II the Germans made use of an<br>electro-me- chanical rotor based cipher Known as The Enigma<br>Machine.<br>Allied cipher machines used in WWII included the British TypeX and the<br>American SIGABA.<br>3.The ADFGVX Cipher: invented by Colonel Fritz Nebel in 1918.<br>The key for this algorithm is a six-by-six square of letters, used to<br>encode a 36-letter alphabet.<br>4.The Playfair Cipher: invented in 1854 by Charles Wheatstone.<br>The Playfair cipher uses a five-by-five table containing a keyword or<br>key phrase.<\/p>\n\n\n\n<p>2 \/ 20<br>5.Breaking the Vigene re Ciph:eIrn 1863, Friedrich Kasiski was the first<br>person to publish a successful general attack on the Vigene re<br>Cipher<br>6.The Vigene re Ciph:eTr his is perhaps the most widely known multialphabet substitution cipher. invented in 1553 by Giovan Battista<br>Bellaso. Uses a series of different Caesar ciphers based on the letters<br>of a keyword.<br>7.The Cipher Disk: The cipher disk was invented by Leon Alberti in<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1466\">\n<li>each time you turned the disk, you used a new cipher. It was<br>literally a disk you turned to encrypt plaintext.<br>8.Multi-Alphabet Substitution: Use of multiple substitution<br>alphabets. Example:Cipher Disk, Vigenere Cipher, Enigma<br>Machine<br>9.Scytale: This was a cylinder tool used by the Greeks, and is often<br>specifically attributed to the Spartans. Physical cylinder that was used<br>to encrypt messages.<br>10.ROT13 Cipher: It is essentially the Caesar cipher always using a<br>rotation or shift of 13 characters.<br>11.The ATBASH Cipher: Hebrew scribes copying religious texts used<br>this cipher. substitutes the first letter of the alphabet for the<br>last, and the second letter for the second-to-the-last, etc.<\/li>\n<\/ol>\n\n\n\n<p>3 \/ 20<br>12.The Caesar Cipher: You can choose to shift any number of letters,<br>either left or right. If you choose to shift two to<br>the right, that would be a +2; if you choose to shift four to the left, thatwould be a<br>-4.<br>13.Mono-Alphabet Substitution: These algorithms<br>simply substitute one character of cipher text for each character of<br>plain text.<\/p>\n\n\n\n<p>4 \/ 20<br>Examples: Atbash Cipher, Caesar Cipher, Rot13<br>14.Symmetric Cryptography: It is simply any algorithm where the key<br>used to decrypt a message is the same key used to encrypt.<br>15.Diffusion: Changes to one character in the plain text affect multiple<br>characters in the cipher text.<br>16.Confusion: Confusion attempts to make the relationship between<br>the statisti- cal frequencies of the cipher text and the actual key as<br>complex as possible. This occurs by using a complex substitution<br>algorithm.<br>17.Avalanche: a small change yields large effects in the output, This is<br>Fiestel&#8217;s variation on Claude Shannon&#8217;s concept of diffusion.<br>18.Kerckhoffs&#8217;s Principle: This principle states that a cryptosystem<br>should be secure even if everything about the system, except the<br>key, is publicly known.<br>19.Substitution: Substitution is changing some part of the plaintext<br>for some matching part of the Cipher Text.<br>20.Transposition: Transposition is the swapping of blocks of ciphertext.<br>21.binary numbers: there are three operations not found in<br>normal math: AND, OR, and XOR operations.<br>22.Binary AND: If both numbers have a one in both places, then the<br>resultant number is a one.<\/p>\n\n\n\n<p>WGU C839 Exam Questions and Answers<br>2023 &#8211; 2024 (Verified Answers)<br>1.Which encryption standard uses the same key to encrypt and<br>decrypt messages ANS Symmetric<br>2.Which algorithm is designated as a Type 2 product by the National<br>Security Agency (NSA) ANS Skipjack<br>3.What is the most commonly used format for certificates ANS X.509 v3<br>4.What is referenced to determine if a certificate has been revoked ANS<br>Certifi- cate revocation list (CRL)<br>5.What needs to be installed on end users&#8217; computers to allow them to<br>trust applications that have been digitally signed by the developer ANS<br>Sender&#8217;s public key<\/p>\n\n\n\n<p>6.Which type of certificate must be certified by an authority to verify it<br>with other participants ANS Public<br>7.What is an attribute of the Rivest Cipher 4 (RC4) algorithm ANS It<br>requires a unique nonce.<br>8.Which mode generates the key stream with a nonce and<br>incrementing value ANS Counter (CTR)<br>9.Which mode is a stream algorithm that concatenates an<br>incrementing value with a nonce ANS Counter (CTR)<br>10.Which key would an administrator use to encrypt data so only the<br>CEO can decrypt it ANS CEO&#8217;s public key<br>11.What is the result of a hash function ANS Digest<br>12.What is used to efficiently encrypt large files ANS Symmetric<br>encryption<\/p>\n\n\n\n<p>WGU C839 Exam Study Questions and Answers<br>2023 &#8211; 2024 (Verified Answers)<br>1.Which encryption standard is approved by the National Security<br>Agency (NSA) for classified information ANS Advanced Encryption<br>Standard (AES<br>2.Which National Security Agency (NSA) encryption algorithms are<br>uneval- uated commercial cryptographic components ANS Type 4<br>3.Which method is used to verify the validity of a certificate ANS Online<br>Certifi- cate Status Protocol (OCSP)<br>4.What is used to protect an encryption key and deliver it quickly ANS<br>Digitally signed symmetrical key encryption sent via email<br>5.Why should a certificate authority (CA) assign an expiration date for<br>certificates it issues ANS A certificate with a short life span limits how<br>long data is vulnerable if the key is compromised<\/p>\n\n\n\n<p>6.What is used as a virtual representation that identifies a person as an<br>entity by a trusted third party ANS Digital signature<br>7.Which attribute is common to stream ciphers ANS XORing pseudorandom bytes with plaintext<br>8.Which mode generates a pseudo-random stream of bytes and XORs<br>the plaintext while encrypting ANS Output feedback (OFB)<br>9.What is a common attribute of a streaming algorithm ANS It encrypts a<br>bit at a time.<br>10.What is required to decrypt data encrypted by a symmetric key ANS<br>An identical copy of the key<br>11.Which sender-identifying input must be provided when digitally<br>signing a message ANS Public key<br>12.What does m represent, assuming that the encryption function is<\/p>\n\n\n\n<p>WGU C839 &#8211; Intro to Cryptography Exam<br>Questions and Answers<br>2023 &#8211; 2024 (Verified Answers)<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>What type of encryption uses different keys to encrypt and decrypt<br>the message?<br>A Symmetric<br>B Private<br>key C<br>Secure<br>D Asymmetric ANS D<\/li>\n\n\n\n<li>The most widely used asymmetric encryption algorithm is what?<br>A RSA<br>B<br>Vigenere<br>C DES<br>D Caesar Cipher ANS A<\/li>\n\n\n\n<li>Original, unencrypted information is referred to as .<\/li>\n<\/ol>\n\n\n\n<p>A text<br>B plaintext<br>C cleantext<br>D ciphertext ANS B<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Which of the following is NOT an asymmetric system?<br>A PGP<br>B RSA<br>C SSL<br>D DES ANS D<\/li>\n\n\n\n<li>In order for User A to send User B an encrypted message that only<br>User B can read, User A must encrypt message with which of the following<br>keys?<br>A User A&#8217;s public key<br>B User A&#8217;s private<br>key C User B&#8217;s public<br>key<br>D User B&#8217;s private key ANS C<\/li>\n\n\n\n<li>The greatest<br>weakness with symmetric algorithms is .<br>A They are less secure than asymmetric<br>B The problem of key exchange<\/li>\n<\/ol>\n\n\n\n<p>C They are slower than asymmetric<br>D The problem of generating keys<br>ANS B<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\">\n<li>Which of the following is generally true about block sizes?<br>A Smaller block sizes increase security<br>B Block sizes must be more than 256 bits to be<br>secure C Block size is irrelevant to security<br>D Larger block sizes increase security ANS D<\/li>\n\n\n\n<li>A is a function that takes a variable-size input m and<br>returns a fixed-size string.<br>A Symmetric cipher<br>B Hash<br>C Asymmetric cipher<br>D Feistel ANS B<\/li>\n\n\n\n<li>Which of the following is a cryptographic protocol that allows two<br>parties to establish a shared key over an insecure channel?<br>A Elliptic Curve<br>B RSA<br>C MD5<br>D Diffie-Hellman ANS D<\/li>\n\n\n\n<li>Ais a digital representation of information that identifies<\/li>\n<\/ol>\n\n\n\n<p>you as a relevant entity by a trusted third party?<br>A Digital Signature<br>B Hash<br>C Ownership<br>stamp D Digest<br>ANS A<br>11.What is the standard used by most digital certificates?<br>A X.509<br>B CRL<br>C RFC 2298<br>D OCSP<br>ANS A<br>12.DES uses keys of what size?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C839 &#8211; Intro to Cryptography EXAM STUDY BUNDLE 2023 &#8211; 2024 (COMPLETE PACKAGE)(Verified) WGU C839 Objective Assessment: Introduction to Cryptography 2023 \u2013 2024 (Verified Answers)1.Which encryption standard uses the same key to encrypt anddecrypt messages ANS Symmetric Key Encryption2.Which algorithm is designated as a Type 2 product by the NationalSecurity Agency (NSA) ANS SKIPJACK3.What [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-119508","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=119508"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119508\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=119508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=119508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=119508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}