D 334 / D334 Objective Assessment (Latest Update 2026 / 2027) Introduction to Cryptography | All Chapters Quizzes Questions and Answers | 100% Correct | Grade A - WGU
Question:
Which attack from the list below entails an attacker determining the amount of time that a user takes to decrypt the message to find the key?
Answer:
time attack
Question:
Encryption keys of mobile devices are commonly stored on the device within the TPM chip, and can only be revealed with a password or fingerprint. What are common features would add difficulty to for an attacker trying to brute force a stolen device to access the key?
Answer:
lock-out time 1 / 4
Question:
In terms of a backdoor in cryptography, what are the two main methods used?Select all that apply.
Answer:
Key escrow, NOBUS
Question:
Which attack happens when an attacker takes a legitimate message and sends it into the network at some future time.
Answer:
replay
Question:
Which attack commonly used against SSL involves an attacker capturing the cipher for the pre-shared key and then re-ciphering with an additional value?
Answer:
Bleichenbacher's attack
- / 4
Question:
Which attack entails an attacker choosing a ciphertext and obtaining its decryption under an unknown key. The attacker then can enter one or more known ciphertexts into a system and obtain the resulting plaintexts. From these pieces of information, the attacker can attempt to recover the hidden secret key used for decryption.
Answer:
Chosen ciphertext
Question:
The ____ attack involves an attacker modifying messages.
Answer:
active
Question:
RSA encryption keys can be guessed if the values are non-deterministic.
Answer:
False
- / 4
Question:
Select the common methods used to crack RSA from the list below. Select all that apply.
Answer:
Factorizing N, CRT
Question:
Select the implementation aspects that cause potential security problems with AES.
Answer:
Use of electronic code book, Use of nonrandomized values for key generation, Use of encryption keys generated by a password
Question:
A poor implementation of AES that involves keys being generated by a password makes it susceptible to which type of attack?
Answer:
brute force
- / 4