WGU - Intro to Cryptography - D334 11 studiers recently Leave the first rating Students also studied Terms in this set (35) Western Governors UniversityD 334 Save C839v5/D334 Additional Practice Teacher 165 terms ShawnD_Preview Introduction to Cryptography - D33...120 terms PerkoniPreview Introduction to Cryptography - D33...250 terms Square_Bubble Preview C839v5 Teacher Sha Practice questions for this set Learn1 / 7Study using Learn What certificate mgmt process includes key recovery?DES block size and key size?64bit block size, 56bit key size 3DES block size and key size?64bit block size, 112bit key size AES block size and key size?128bit block size, 128, 192, or 256bit key size IDEA block size and key size?64bit block size, 128bit key size Choose an answer 1Issued2Revoked 3Cleared4Variable Don't know?
Skipjack block size and key size?64bit block size, 80bit key size Blowfish block size and key size?64bit block size, 32-448bit key size (commonly 128, 192, or 256) Twofish block size and key size?128bit block size, 1-256bit key size (commonly 128, 192, or 256) RC5 block size and key size?32, 64 or 128bit block size, 0-2048bit key size RC2 block size and key size?64bit block size, 1-128bit key size (recommended minimum 40) RC6 block size and key size?Variable bit block size (commonly 128), variable bit key size (commonly 128, 192 or 256) XTEA block size and key size?64bit block size, 128bit key size MD2 hash value?128bit MD5 hash value?128bit MD4 hash value?128bit MD6 hash value?1-512bit SHA-1 hash value?160bit SHA-2 hash value?256, 384, or 512bit SHA-3 hash value?Variable SHA-256 hash value?256bit SHA-512 hash value?512bit List symmetric block ciphers:3DES, DES, AES, Twofish, IDEA, RC2/RC5/RC6, Blowfish, Skipjack, Camelia, XTEA
List symmetric stream ciphers:RC4 & ChaCha
List asymmetric ciphers:DH, ECC, El Gamal, RSA
What should you use to import/export .509 certificates that are a part of a chain of trust?
PKCS #12
What certificate mgmt process includes key recovery? Issued What algorithm is used to generate the thumbprint of a certificate?SHA-1
What is the maximum length of encryption keys using WEP?40bits What cipher is used with WEP?RC4 How does TKIP improve WPA over WEP?Hashes the IV and secret key Which cipher uses a grid to map letters to numeric values?Bifid Which cipher uses a 5x5 matrix?Playfair Who broke the Vigenere cipher?Kasiski What is the key size for RC4 with WEP?40 bits Wireless security standard that uses a 128bit RC4 stream cipher?
WPA NIST specification for the encryption of electronic information?
AES