Spring Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the WGU Courses and Certificates Introduction-to-Cryptography Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam Introduction-to-Cryptography Premium Access

View all detail and faqs for the Introduction-to-Cryptography exam


380 Students Passed

86% Average Score

94% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

(How does Electronic Codebook (ECB) mode encryption function?)

Options:

A.

Converts from block to stream, then uses a counter value and a nonce to encrypt the data

B.

Uses a self-synchronizing stream on the blocks, where the IV is encrypted and XORed with the data stream

C.

Uses an IV to encrypt the first block, then uses the result to encrypt the next block

D.

Encrypts each block with the same key, where each block is independent of the others

Questions # 2:

(What describes a true random number generator?)

Options:

A.

Fast and deterministic, and the same input produces the same results

B.

Slow and nondeterministic, and the same input produces different results

C.

Unique integer determined through factorization of integers

D.

Integer increased by one to match requests and responses

Questions # 3:

(Which mechanism can be applied to protect the integrity of plaintext when using AES?)

Options:

A.

RC4

B.

Message Authentication Code (MAC)

C.

RSA

D.

Kerberos key sharing

Questions # 4:

(Which authentication method allows a customer to authenticate to a web service?)

Options:

A.

One-way server authentication

B.

End-to-end authentication

C.

Mutual authentication

D.

One-way client authentication

Questions # 5:

(Which cipher uses shifting letters of the alphabet for encryption?)

Options:

A.

SHA-1

B.

Vigenère

C.

Bifid

D.

Caesar

Questions # 6:

(What is the length of the Initialization Vector (IV) in WEP?)

Options:

A.

24 bits

B.

40 bits

C.

48 bits

D.

56 bits

Questions # 7:

(A company wants to use certificates issued by a root CA to demonstrate to customers that it is a legitimate company being hosted by a cloud provider. Who needs to trust the root CA public key?)

Options:

A.

The seller and the buyer

B.

The cloud provider and the seller

C.

The Federal Trade Commission and the cloud provider

D.

The buyer and the Federal Trade Commission

Questions # 8:

(Why should a forensic investigator create a hash of a victim’s hard drive and of the bitstream copy of the hard drive?)

Options:

A.

To identify if someone opened the drive

B.

To certify the information on the drive is correct

C.

To establish who created the files on the drives

D.

To verify that the drives are identical

Questions # 9:

(Which mode of encryption uses an Initialization Vector (IV) to encrypt the first block and then uses the result to encrypt the next block?)

Options:

A.

Electronic Codebook (ECB)

B.

Cipher Block Chaining (CBC)

C.

Output Feedback (OFB)

D.

Cipher Feedback (CFB)

Questions # 10:

(Which type of network were VPN connections originally designed to tunnel through?)

Options:

A.

Encrypted

B.

Protected

C.

Public

D.

Private

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.