• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Latest Update - (Latest Update) Introduction to Cryptography | ...

QUESTIONS & ANSWERS Dec 16, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

D 334 / D334 Objective Assessment (Latest Update 2026 / 2027) Introduction to Cryptography | Test Review Questions with Answers | 100% Correct | Grade A (Verified Answers) - WGU

Question:

When IPSec ______ mode is used, the connection is tunneled over a public network, but the network traffic is unprotected on either side of the connection.

Answer:

Tunnel

Question:

Determination of whether AH, ESP or both will be used in a given IPSec connection occurs in the 1st phase, IKE.

Answer:

False

  • / 4

Question:

Mike and Ike have decided to use a time-based Security Association (SA) of 5,000 seconds for a tunnel they plan to establish using IPSec. During which phase of the IPSec connection setup will the SA lifetime be established?

Answer:

Phase 2

Question:

The encryption that happens in a secure tunnel is normally achieved with _____ encryption and the associated key that will be used for the communication is protected using _____ encryption.

Answer:

Symmetric, Asymmetric

Question:

From the list below, select the items that could pose concerns to someone wanting to participate in a key escrow service. Select all that apply.

Answer:

  • Compromise due to extortion
  • Compromise due to Insider threat
  • / 4

Question:

Which attack from the list below entails an attacker determining the amount of time that a user takes to decrypt the message to find the key?

Answer:

time attack

Question:

Which attack commonly used against SSL involves an attacker capturing the cipher for the pre-shared key and then re-ciphering with an additional value?

Answer:

Bleichenbacher's attack

Question:

Select the common methods used to crack RSA from the list below. Select all that apply.

Answer:

  • Factorizing N
  • CRT
  • / 4

Question:

A poor implementation of AES that involves keys being generated by a password makes it susceptible to which type of attack?

Answer:

brute force

Question:

An attacker tricks a victim user to sign for seemingly harmless messages, performs a mathematical calculation to ascertain the actual signature, and then uses the signature to sign items as the victim. What attack on cryptography does this scenario describe?

Answer:

Blinding Attack

Question:

Select the common methods used to crack RSA form the list below. Select two.

Answer:

  • Side-channel attacks
  • Factorization

  • / 4

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

The detailed explanations offered by this document helped me ace my presentation. A remarkable purchase!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: QUESTIONS & ANSWERS
Added: Dec 16, 2025
Description:

D 334 / D334 Objective Assessment (Latest Update) Introduction to Cryptography | Test Review Questions with Answers | 100% Correct | Grade A (Verified Answers) - WGU Question: When IPSec ______ mod...

Unlock Now
$ 1.00