• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Latest Update - (Latest Update) Introduction to Cryptography | All

QUESTIONS & ANSWERS Dec 16, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

D 334 / D334 Objective Assessment (Latest Update 2026 / 2027) Introduction to Cryptography | All Chapters Quizzes Questions and Answers | 100% Correct | Grade A - WGU

Question:

Which attack from the list below entails an attacker determining the amount of time that a user takes to decrypt the message to find the key?

Answer:

time attack

Question:

Encryption keys of mobile devices are commonly stored on the device within the TPM chip, and can only be revealed with a password or fingerprint. What are common features would add difficulty to for an attacker trying to brute force a stolen device to access the key?

Answer:

lock-out time 1 / 4

Question:

In terms of a backdoor in cryptography, what are the two main methods used?Select all that apply.

Answer:

Key escrow, NOBUS

Question:

Which attack happens when an attacker takes a legitimate message and sends it into the network at some future time.

Answer:

replay

Question:

Which attack commonly used against SSL involves an attacker capturing the cipher for the pre-shared key and then re-ciphering with an additional value?

Answer:

Bleichenbacher's attack

  • / 4

Question:

Which attack entails an attacker choosing a ciphertext and obtaining its decryption under an unknown key. The attacker then can enter one or more known ciphertexts into a system and obtain the resulting plaintexts. From these pieces of information, the attacker can attempt to recover the hidden secret key used for decryption.

Answer:

Chosen ciphertext

Question:

The ____ attack involves an attacker modifying messages.

Answer:

active

Question:

RSA encryption keys can be guessed if the values are non-deterministic.

Answer:

False

  • / 4

Question:

Select the common methods used to crack RSA from the list below. Select all that apply.

Answer:

Factorizing N, CRT

Question:

Select the implementation aspects that cause potential security problems with AES.

Answer:

Use of electronic code book, Use of nonrandomized values for key generation, Use of encryption keys generated by a password

Question:

A poor implementation of AES that involves keys being generated by a password makes it susceptible to which type of attack?

Answer:

brute force

  • / 4

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

With its step-by-step guides, this document made learning easy. Definitely a impressive choice!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: QUESTIONS & ANSWERS
Added: Dec 16, 2025
Description:

D 334 / D334 Objective Assessment (Latest Update) Introduction to Cryptography | All Chapters Quizzes Questions and Answers | 100% Correct | Grade A - WGU Question: Which attack from the list below...

Unlock Now
$ 1.00