D 334 / D334 Objective Assessment (Latest Update 2026 / 2027) Introduction to Cryptography | Test Review Questions with Answers | 100% Correct | Grade A (Verified Answers) - WGU
Question:
When IPSec ______ mode is used, the connection is tunneled over a public network, but the network traffic is unprotected on either side of the connection.
Answer:
Tunnel
Question:
Determination of whether AH, ESP or both will be used in a given IPSec connection occurs in the 1st phase, IKE.
Answer:
False
- / 4
Question:
Mike and Ike have decided to use a time-based Security Association (SA) of 5,000 seconds for a tunnel they plan to establish using IPSec. During which phase of the IPSec connection setup will the SA lifetime be established?
Answer:
Phase 2
Question:
The encryption that happens in a secure tunnel is normally achieved with _____ encryption and the associated key that will be used for the communication is protected using _____ encryption.
Answer:
Symmetric, Asymmetric
Question:
From the list below, select the items that could pose concerns to someone wanting to participate in a key escrow service. Select all that apply.
Answer:
- Compromise due to extortion
- Compromise due to Insider threat
- / 4
Question:
Which attack from the list below entails an attacker determining the amount of time that a user takes to decrypt the message to find the key?
Answer:
time attack
Question:
Which attack commonly used against SSL involves an attacker capturing the cipher for the pre-shared key and then re-ciphering with an additional value?
Answer:
Bleichenbacher's attack
Question:
Select the common methods used to crack RSA from the list below. Select all that apply.
Answer:
- Factorizing N
- CRT
- / 4
Question:
A poor implementation of AES that involves keys being generated by a password makes it susceptible to which type of attack?
Answer:
brute force
Question:
An attacker tricks a victim user to sign for seemingly harmless messages, performs a mathematical calculation to ascertain the actual signature, and then uses the signature to sign items as the victim. What attack on cryptography does this scenario describe?
Answer:
Blinding Attack
Question:
Select the common methods used to crack RSA form the list below. Select two.
Answer:
- Side-channel attacks
- Factorization
- / 4