Pre-assesment - Introduction to Cryptography - C839 - WGU 10 studiers recently 4.6 (7 reviews) Students also studied Terms in this set (62) Western Governors UniversityD 334 Save C839v5/D334 Additional Practice Teacher 165 terms ShawnD_Preview WGU Course C838 - Managing Clou...1,037 terms WieldyStone2 Preview WGU Course C839 - Intro to Crypto...293 terms WieldyStone2 Preview C839v5 Teacher Sha
- A business wants to use keys issued by a trusted third
- A business wants to use keys issued by a trusted third
party to demonstrate to potential customers that it is a legitimate organization.Which key is used to sign the certificate issued to the business?Private key of the root CA Public key of the root CA Private key of the company Public key of the company Private key of the root CA
party to demonstrate it is a legitimate organization to potential customers.Which key should the business send to potential customers to prove its identity?Private key of the root CA Public key of the root CA Private key of the company Public key of the company Public key of the company
- What should an administrator use to import and export
- Which field displays the hash, or digest, of the
- Employee B sends Employee A an encrypted message.
- What is an example of a symmetric algorithm?
- Which two components involved in performing
- Employee A created a secret key and wants to send it
all items written using X.509 that are part of a chain of trust?
CER Public Key Cryptography Standard (PKCS) #7 Public Key Cryptography Standard (PKCS) #12 RTF Public Key Cryptography Standard (PKCS) #12
certificate in an X.509 certificate?Subject Issuer Version Thumbprint Thumbprint
What does Employee A use to decrypt the message from Employee B?Employee A's private key Employee B's private key Employee A's public key Employee B's public key Employee A's private key
RSA AES SHA MD5 AES
encryption are known to the party that will perform decryption before symmetric encryption is applied?Choose 2 answers.Cryptographic algorithm Cryptographic key Plaintext content Initialization vector Nonce value Cryptographic algorithm Cryptographic key
to Employee B without any coworkers being able to decrypt the message.Which key needs to encrypt the message?Employee A's public key Employee A's private key Employee B's public key Employee B's private key Employee B's public key
- Which type of cipher is ChaCha?
- What is the key size for RC4 with WEP?
- Which symmetric encryption technique uses a 56-bit
- Which wireless security standard uses a 128-bit RC4
- What defines a prime number?
- What is 29 mod 12?
Asymmetric Block Stream Hash Stream
40 bits 128 bits 256 bits 512 bits 40 bits
key size and a 64-bit block size?
AES DES 3DES IDEA DES
stream cipher for encrypted communications?
WPA WEP VPN GSM WPA
Only has factors of itself and 1 Only has factors of itself and 2 Evenly divisible by 3.14 Evenly divisible by 10 Only has factors of itself and 1
3 5 7 5
- What happens to the hash of a file if it is rehashed
after the first character of the file is changed?The entire hash is different.The beginning of the hash is altered.The hash is unaltered.The hash algorithm is replaced.The entire hash is different.
- What is the length (in bits) of an MD5 hash output?
- How many characters are used in an LM hash
32 64 128 256 128
password?7 8 14 16 14
18. A Windows credential is identified as follows:
user:FDA95FBABC199D22LLD3B435B51876KK:199DDFD4
EF0E9CD9KMNC6FE771IL124B8:::
What is used to store this password?MD5 Bcrypt
SHA-512
NTLM NTLM
- What is a rainbow table?
- Which mode encrypts each group with the same key,
- Which mode of block encryption results in the same
List of matching usernames and passwords Precompiled list of common words List of commonly used passwords Precompiled list of hash values Precompiled list of common words
leaving each group independent of the others?
ECB CBC CFB OFB ECB
outcome for matching blocks of a plaintext message?Electronic Code Book (ECB) Output feedback (OFB) Cipher block chaining (CBC) Cipher feedback (CFB) ECB