• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Pre-assesment - Introduction to Cryptography - C839 - WGU

Latest WGU Jan 12, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Pre-assesment - Introduction to Cryptography - C839 - WGU 10 studiers recently 4.6 (7 reviews) Students also studied Terms in this set (62) Western Governors UniversityD 334 Save C839v5/D334 Additional Practice Teacher 165 terms ShawnD_Preview WGU Course C838 - Managing Clou...1,037 terms WieldyStone2 Preview WGU Course C839 - Intro to Crypto...293 terms WieldyStone2 Preview C839v5 Teacher Sha

  • A business wants to use keys issued by a trusted third
  • party to demonstrate to potential customers that it is a legitimate organization.Which key is used to sign the certificate issued to the business?Private key of the root CA Public key of the root CA Private key of the company Public key of the company Private key of the root CA

  • A business wants to use keys issued by a trusted third
  • party to demonstrate it is a legitimate organization to potential customers.Which key should the business send to potential customers to prove its identity?Private key of the root CA Public key of the root CA Private key of the company Public key of the company Public key of the company

  • What should an administrator use to import and export
  • all items written using X.509 that are part of a chain of trust?

    CER Public Key Cryptography Standard (PKCS) #7 Public Key Cryptography Standard (PKCS) #12 RTF Public Key Cryptography Standard (PKCS) #12

  • Which field displays the hash, or digest, of the
  • certificate in an X.509 certificate?Subject Issuer Version Thumbprint Thumbprint

  • Employee B sends Employee A an encrypted message.
  • What does Employee A use to decrypt the message from Employee B?Employee A's private key Employee B's private key Employee A's public key Employee B's public key Employee A's private key

  • What is an example of a symmetric algorithm?
  • RSA AES SHA MD5 AES

  • Which two components involved in performing
  • encryption are known to the party that will perform decryption before symmetric encryption is applied?Choose 2 answers.Cryptographic algorithm Cryptographic key Plaintext content Initialization vector Nonce value Cryptographic algorithm Cryptographic key

  • Employee A created a secret key and wants to send it
  • to Employee B without any coworkers being able to decrypt the message.Which key needs to encrypt the message?Employee A's public key Employee A's private key Employee B's public key Employee B's private key Employee B's public key

  • Which type of cipher is ChaCha?
  • Asymmetric Block Stream Hash Stream

  • What is the key size for RC4 with WEP?
  • 40 bits 128 bits 256 bits 512 bits 40 bits

  • Which symmetric encryption technique uses a 56-bit
  • key size and a 64-bit block size?

    AES DES 3DES IDEA DES

  • Which wireless security standard uses a 128-bit RC4
  • stream cipher for encrypted communications?

    WPA WEP VPN GSM WPA

  • What defines a prime number?
  • Only has factors of itself and 1 Only has factors of itself and 2 Evenly divisible by 3.14 Evenly divisible by 10 Only has factors of itself and 1

  • What is 29 mod 12?

3 5 7 5

  • What happens to the hash of a file if it is rehashed
  • after the first character of the file is changed?The entire hash is different.The beginning of the hash is altered.The hash is unaltered.The hash algorithm is replaced.The entire hash is different.

  • What is the length (in bits) of an MD5 hash output?
  • 32 64 128 256 128

  • How many characters are used in an LM hash
  • password?7 8 14 16 14

18. A Windows credential is identified as follows:

user:FDA95FBABC199D22LLD3B435B51876KK:199DDFD4

EF0E9CD9KMNC6FE771IL124B8:::

What is used to store this password?MD5 Bcrypt

SHA-512

NTLM NTLM

  • What is a rainbow table?
  • List of matching usernames and passwords Precompiled list of common words List of commonly used passwords Precompiled list of hash values Precompiled list of common words

  • Which mode encrypts each group with the same key,
  • leaving each group independent of the others?

    ECB CBC CFB OFB ECB

  • Which mode of block encryption results in the same
  • outcome for matching blocks of a plaintext message?Electronic Code Book (ECB) Output feedback (OFB) Cipher block chaining (CBC) Cipher feedback (CFB) ECB

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

I was amazed by the comprehensive coverage in this document. It was incredibly useful for my research. Truly impressive!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 12, 2026
Description:

Pre-assesment - Introduction to Cryptography - C839 - WGU 10 studiers recently 4.6 (7 reviews) Students also studied Terms in this set Western Governors UniversityD 334 Save C839v5/D334 Additional ...

Unlock Now
$ 11.00