WGUl D334l Finall Examl (Latestl 2026/l 2027l Update)l Introductionl tol Cryptographyl Reviewl |100%l Verifiedl Questionsl &l Answersl |l Gradel A
Q:l Whichl ofl thel followingl bestl verifiesl thel originl ofl al datal file?l A.l Confidentialityl B.l Integrityl C.l Digitall signaturel D.l Publicl key
Answer:
C.l Digitall signaturel -l Confirmsl originl andl authenticityl ofl thel data.
Q:l Whichl ofl thesel isl al forml ofl blockl cipherl attackl thatl usesl linearl approximations?l A.l Algebraicl attackl B.l Linearl cryptanalysisl C.l Kasiskil attackl D.l Side-channell attack
Answer:
B.l Linearl cryptanalysisl -l Usesl linearl approximationsl tol analyzel blockl ciphers.
Q:l Whatl isl thel keyl sizel ofl Chaskey?l A.l 64-bitl B.l 128-bitl C.l 192-bitl D.l 256-bit
Answer:
B.l 128-bitl -l Chaskeyl usesl al 128-bitl keyl forl lightweightl authentication.
Q:l Whatl happensl tol NTLMl ifl thel passwordl isl fewerl thanl 14l characters?l A.l Itl failsl B.l Itl truncatesl thel passwordl C.l Itl padsl withl nulll charactersl D.l Itl usesl MD5l instead
Answer:
C.l Itl padsl withl nulll charactersl -l NTLMl padsl shortl passwordsl tol 14l bytes.
Q:l Whatl hashl lengthl doesl SHA-1l produce?l A.l 128l bitsl B.l 160l bitsl C.l 256l bitsl D.l 512l bits
Answer:
B.l 160l bitsl -l SHA-1l producesl al 160-bitl hashl output. 1 / 3
Q:l Whatl encryptionl algorithml wasl usedl inl GSMl A5/1l andl A5/2?l A.l DESl B.l RC4l C.l Streaml cipherl D.l Blockl cipher
Answer:
C.l Streaml cipherl -l GSMl A5/1l andl A5/2l arel streaml ciphersl forl real-timel communication.
Q:l Whatl isl thel correctl MODl result:l 53l modl 11?l A.l 7l B.l 9l C.l 6l D.l 8
Answer:
A.l 9l -l 53l ÷l 11l =l 4l remainderl 9.
Q:l Whatl happensl tol miningl rewardsl asl blockchainl lengthl increases?l A.l Increasel B.l Decreasel C.l Remainl constantl D.l Becomel random
Answer:
B.l Decreasel -l Miningl rewardsl typicallyl halvel overl timel tol controll inflation.
Q:l Whatl portl doesl IPSecl usel forl IKEl negotiation?l A.l 80l B.l 443l C.l 500l D.l 22
Answer:
C.l 500l -l IKEl (Internetl Keyl Exchange)l usesl UDPl portl 500.
Q:l Whichl blockl cipherl model usesl al counterl andl nonce,l allowingl parallell encryption?l A.l ECBl B.l CBCl C.l CTRl D.l OFB
Answer:
C.l CTRl -l Counterl model usesl al noncel andl counter,l enablingl parallelism.
Q:l Inl whichl stagel ofl keyl lifecyclel isl al certificatel markedl invalidl butl stilll historicallyl traceable?l A.l Initializationl B.l Issuedl C.l Cancellationl D.l Revocation
Answer:
D.l Revocationl -l Revokedl certificatesl arel invalidl butl canl bel trackedl forl auditing.
Q:l Whichl encryptionl model leaksl patternsl andl shouldl notl bel used?l A.l ECBl B.l CBCl C.l CTRl D.l GCM 2 / 3
Answer:
A.l ECBl -l ECBl encryptsl identicall plaintextl blocksl intol identicall ciphertextl blocks,l revealingl patterns.
Q:l Whatl isl thel mainl advantagel ofl forwardl secrecy?l A.l Preventsl certificatel expirationl B.l Protectsl pastl sessionsl evenl ifl keysl arel stolenl C.l Enablesl fasterl encryptionl D.l Simplifiesl keyl management
Answer:
B.l Protectsl pastl sessionsl evenl ifl keysl arel stolenl -l Forwardl secrecyl ensuresl compromisedl keysl dol notl affectl pastl sessions.
Q:l Whatl isl thel differencel betweenl WPA-Enterprisel andl WPA-Personal?l A.l WPA- Enterprisel usesl PSKl B.l WPA-Enterprisel usesl 802.1Xl authenticationl C.l WPA-Personall requiresl al RADIUSl serverl D.l WPA-Personall usesl certificates
Answer:
B.l WPA-Enterprisel usesl 802.1Xl authenticationl -l Enterprisel model usesl RADIUSl serversl forl centralizedl authentication.
Q:l Whatl isl thel functionl ofl OCSP?l A.l Generatel hashesl B.l Verifyl publicl keysl C.l Validatel certificatesl inl reall timel D.l Encryptl messages
Answer:
C.l Validatel certificatesl inl reall timel -l OCSPl providesl up-to-datel revocationl statusl forl certificates.
Q:l Whyl isl hashingl importantl whenl collectingl digitall evidence?l A.l Itl compressesl thel datal B.l Itl ensuresl datal confidentialityl C.l Itl verifiesl datal integrityl D.l Itl encryptsl thel evidence
Answer:
C.l Itl verifiesl datal integrityl -l Hashesl ensurel evidencel hasl notl beenl altered.
Q:l Whichl ofl thel followingl bestl describesl al blockl cipher?l A.l Streaml cipherl B.l Fixed- sizel chunksl C.l Password-onlyl cipherl D.l XOR-onlyl cipher
- / 3