WGUl D334l Objectivel Assessmentl (Latestl 2026/l 2027l Update)l Introductionl tol Cryptographyl Reviewl |100%l Verifiedl Questionsl &l Answersl |l Gradel A
Q:l Anl administratorl hasl configuredl al virtuall privatel networkl (VPN)l connectionl utilizingl IPsecl tunnell model withl Encapsulatingl Securityl Payloadl (ESP)l betweenl thel corporatel officel andl al remotel office.l Wherel canl thel packetsl bel inspectedl byl intrusionl detectionl systemsl (IDSs)l andl virusl scanners?
Answer:
Atl thel headquartersl andl thel offsitel location
Q:l Whichl defaultl portl mustl bel openl forl thel IPsecl keyl exchangel tol bel successful?
Answer:
UDPl 500
Q:l Whichl protocoll indicatesl thel virtuall privatel networkl (VPN)l isl usingl Authenticationl Headerl (AH)?
Answer:
51
Q:l Whichl model encryptsl eachl groupl withl thel samel key,l leavingl eachl groupl independentl ofl thel others?
Answer:
ECB
Q:l Whichl model ofl blockl encryptionl resultsl inl thel samel outcomel forl matchingl blocksl ofl al plaintextl message?
Answer:
Electronicl Codel Bookl (ECB)
Q:l Howl doesl CBCl model encryptionl function? 1 / 4
Answer:
Usesl anl initializationl vectorl (IV)l tol encryptl thel firstl block,l thenl usesl thel resultl ofl thel encryptionl tol encryptl thel nextl block
Q:l Whichl encryptionl model alwaysl producesl thel samel resultl forl thel samel plaintext?
Answer:
ECB
Q:l Whichl informationl protectionl methodl hasl anl 80-bitl keyl andl operatesl onl 64-bitl datal blocks?
Answer:
Skipjack
Q:l Howl manyl transformationl roundsl doesl AESl usel withl al 192-bitl key?
Answer:
12
Q:l Howl manyl transformationl roundsl doesl AESl usel withl al 128-bitl key?
Answer:
10
Q:l Whichl encryptionl algorithml didl thel Nationall Institutel ofl Standardsl andl Technologyl (NIST)l designatel asl al specificationl forl thel encryptionl ofl electronicl information?
Answer:
AES
Q:l Whichl cipherl usesl al gridl tol mapl lettersl intol numericl values?
Answer:
Bifid
Q:l Whichl cipherl usesl al five-by-fivel matrixl withl nonrepeatingl characters?
Answer:
Playfair
Q:l Whatl doesl al frequencyl analysisl attackl tol breakl encryptionl involve?
Answer: 2 / 4
Analyzingl ciphertextl tol identifyl textl variationl andl comparingl thel textl tol standardl Englishl characters
Q:l Whichl techniquel shouldl al securityl analystl usel tol determinel thel keyl lengthl inl al Vigenèrel cipher?
Answer:
Kasiskil examination
Q:l Whatl definesl al primel number?
Answer:
Onlyl hasl factorsl ofl itselfl andl 1
Q:l Whatl isl 29l modl 12?
Answer:
5
Q:l Whatl happensl tol thel hashl ofl al filel ifl itl isl rehashedl afterl thel firstl characterl ofl thel filel isl changed?
Answer:
Thel entirel hashl isl different.
Q:l Whatl isl thel lengthl (inl bits)l ofl anl MD5l hashl output?
Answer:
128
Q:l Howl manyl charactersl arel usedl inl anl LMl hashl password?
Answer:
14
Q:l Al Windowsl credentiall isl identifiedl asl follows:l user:FDA95FBABC199D22LLD3B435B51876KK:199DDFD4EF0E9CD9KMNC6FE771IL124 B8:::Whatl isl usedl tol storel thisl password?
Answer:
NTLM
Q:l Whatl isl al rainbowl table? 3 / 4
Answer:
Precompiledl listl ofl hashl values
Q:l Employeel Bl sendsl Employeel Al anl encryptedl message.Whatl doesl Employeel Al usel tol decryptl thel messagel froml Employeel B?
Answer:
Employeel A'sl privatel key
Q:l Whatl isl anl examplel ofl al symmetricl algorithm?
Answer:
AES
Q:l Whichl twol componentsl involvedl inl performingl encryptionl arel knownl tol thel partyl thatl willl performl decryptionl beforel symmetricl encryptionl isl applied?
Answer:
Cryptographicl keyl +l Cryptographicl algorithm
Q:l Employeel Al createdl al secretl keyl andl wantsl tol sendl itl tol Employeel Bl withoutl anyl coworkersl beingl ablel tol decryptl thel message.Whichl keyl needsl tol encryptl thel message?
Answer:
Employeel B'sl publicl key
Q:l Whichl typel ofl cipherl isl ChaCha?
Answer:
Stream
Q:l Whatl isl thel keyl sizel forl RC4l withl WEP?
Answer:
40l bits
Q:l Whichl symmetricl encryptionl techniquel usesl al 56-bitl keyl sizel andl al 64-bitl blockl size?
Answer:
DES
- / 4