• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Pre-Assessment Intro to Cryptography - D334

Latest WGU Jan 13, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Pre-Assessment Intro to Cryptography - D334 10 studiers in 3 days 5.0 (6 reviews) Students also studied Terms in this set (60) Western Governors UniversityD 278 Save C839v5/D334 Additional Practice Teacher 165 terms ShawnD_Preview Introduction to Cryptography - D33...250 terms Square_Bubble Preview C839v5/D334 Algorithms Drill Teacher 51 terms ShawnD_Preview Introdu 120 term Per A business wants to use keys issued by a trusted third party to demonstrate to potential customers that it is a legitimate organization. Which key is used to sign the certificate issued to the business?

  • Private key of the root CA
  • Public key of the root CA
  • Private key of the company
  • Public key of the company
  • Private key of the root CA A business wants to use keys issued by a trusted third party to demonstrate it is a legitimate organization to potential customers. Which key should the business send to potential customers to prove its identity?

  • Private key of the root CA
  • Public key of the root CA
  • Private key of the company
  • Public key of the company
  • Public key of the company What should an administrator use to import and export all items written using X.509 that are part of a chain of trust?

A. CER

  • Public Key Cryptography Standard (PKCS) #7
  • Public Key Cryptography Standard (PKCS) #12

D. RTF

Public Key Cryptography Standard (PKCS) #12

Which field displays the hash, or digest, of the certificate in an X.509 certificate?

  • Subject
  • Issuer
  • Version
  • Thumbprint
  • Thumbprint Which certificate management process involves key recovery?

  • Initialization
  • Issued
  • Cancellation
  • Hold
  • Issued Which task does a root CA perform before publishing its own certificate?

  • Encrypting it with its private key
  • Encrypting it with its public key
  • Signing it with its private key
  • Signing it with its public key
  • Signing it with its private key Which algorithm is used to generate the thumbprint of a certificate?

A. RSA

B. 3DES

C. AES

D. SHA-1

SHA-1 Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely distributed.Which approach should be used for encryption and distribution?

  • Encrypt by using symmetric keys and distribute by
  • using asymmetric keys

  • Encrypt by using asymmetric keys and distribute by
  • using symmetric keys

  • Encrypt by using symmetric keys and distribute by
  • using symmetric keys

  • Encrypt by using asymmetric keys and distribute by
  • using asymmetric keys Encrypt by using symmetric keys and distribute by using asymmetric keys What is the role of a key in asymmetric encryption and decryption?

  • A public key is used for both encryption and
  • decryption.

  • A private key is used for both encryption and
  • decryption.

  • A public key is used for encryption, and a private key is
  • used for decryption.

  • A private key is used for encryption, and a public key is
  • used for decryption.A public key is used for encryption, and a private key is used for decryption.

A security analyst is validating the integrity and authenticity of a data transaction. Which PKI component is being used?

  • Digital certificate
  • Digital signature
  • Asymmetric encryption
  • Symmetric encryption
  • Digital signature Which PKI component generates digital certificates?

  • Certificate signing request (CSR)
  • Certificate policy (CP)
  • Certificate revocation list (CRL)
  • Certificate authority (CA)
  • Certificate authority (CA) What is the maximum length (in bits) of encryption keys used by the WEP protocol?

  • 40
  • 56

C. 128

D. 256

40 What is a difference between WPA-Enterprise and WPA- Personal?

  • Support for Temporal Key Integrity Protocol
  • Support for an authentication server
  • Use of a session key
  • Use of a 48-bit initialization vector
  • Support for an authentication server Which cipher is used with WEP?

A. RC5

B. RC4

C. TKIP

D. AES

RC4 How does TKIP improve WPA over WEP?

  • Hashes the initialization vector and secret key
  • Implements a RADIUS server
  • Implements an authentication server
  • Creates an AES encryption key
  • Hashes the initialization vector and secret key An administrator has configured a virtual private network (VPN) connection utilizing IPsec tunnel mode with Encapsulating Security Payload (ESP) between the corporate office and a remote office. Where can the packets be inspected by intrusion detection systems (IDSs) and virus scanners?

  • Only at the headquarters
  • Only at the offsite location
  • At the headquarters and the offsite location
  • Between the headquarters and the offsite location
  • At the headquarters and the offsite location

Which default port must be open for the IPsec key exchange to be successful?

A. UDP 162

B. TCP 389

C. TCP 465

D. UDP 500

UDP 500

Which protocol indicates the virtual private network (VPN) is using Authentication Header (AH)?

  • 48
  • 50
  • 51
  • 58
  • 51 Which cipher uses a grid to map letters into numeric values?

  • Bifid

B. SHA-1

  • Caesar
  • Vigenère
  • Bifid Which cipher uses a five-by-five matrix with nonrepeating characters?

  • Playfair
  • Rail code
  • Pigpen
  • Vigenère
  • Playfair What does a frequency analysis attack to break encryption involve?

  • Analyzing ciphertext to identify text variation and
  • comparing the text to standard English characters

  • Performing an exhaustive search to attempt every
  • possible mapping or key

  • Interfering between two parties and sometimes
  • intercepting or modifying data in the communication stream

  • Identifying part of the ciphertext and the
  • corresponding plaintext Analyzing ciphertext to identify text variation and comparing the text to standard English characters Which technique should a security analyst use to determine the key length in a Vigenère cipher?

  • Frequency analysis
  • Brute force
  • Kasiski examination
  • Known plaintext
  • Kasiski examination What defines a prime number?

  • Only has factors of itself and 1
  • Only has factors of itself and 2
  • Evenly divisible by 3.14
  • Evenly divisible by 10
  • Only has factors of itself and 1

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

I was amazed by the practical examples in this document. It was incredibly useful for my research. Truly excellent!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 13, 2026
Description:

Pre-Assessment Intro to Cryptography - D334 10 studiers in 3 days 5.0 (6 reviews) Students also studied Terms in this set Western Governors UniversityD 278 Save C839v5/D334 Additional Practice Teac...

Unlock Now
$ 11.00