Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the WGU Courses and Certificates Introduction-to-Cryptography Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam Introduction-to-Cryptography Premium Access

View all detail and faqs for the Introduction-to-Cryptography exam


464 Students Passed

90% Average Score

97% Same Questions
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

(What is a component of a one-time password (OTP) that is needed to guess future iterations of passwords?)

Options:

A.

Function

B.

Initialization vector

C.

Encryption algorithm

D.

Seed

Questions # 12:

(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)

Options:

A.

Privacy Enhanced Mail (PEM)

B.

Online Certificate Status Protocol (OCSP)

C.

Root Certificate Authority (CA)

D.

Policy Certificate Authority (CA)

Questions # 13:

(What are the roles of keys when using digital signatures?)

Options:

A.

A private key is used for both signing and signature validation.

B.

A private key is used for signing, and a public key is used for signature validation.

C.

A public key is used for both signing and signature validation.

D.

A public key is used for signing, and a private key is used for signature validation.

Questions # 14:

(What type of encryption uses different keys to encrypt and decrypt the message?)

Options:

A.

Symmetric

B.

Private key

C.

Secure

D.

Asymmetric

Questions # 15:

(A security analyst is using 3DES for data encryption. Which 3DES key size is valid?)

Options:

A.

128-bit

B.

2,048-bit

C.

56-bit

D.

112-bit

Questions # 16:

(What are the primary characteristics of Bitcoin proof of work?)

Options:

A.

Difficult to produce and difficult to verify

B.

Difficult to produce and easy to verify

C.

Easy to produce and easy to verify

D.

Easy to produce and difficult to verify

Questions # 17:

(How are limits managed for the number of bitcoins that can be created and stored in a blockchain?)

Options:

A.

Rewards for mining reduce over time

B.

The total number of participants has been set

C.

A maximum has been established per country

D.

Each person has a maximum number

Questions # 18:

(An administrator has configured a Virtual Private Network (VPN) connection utilizing IPsec transport mode with Encapsulating Security Payload (ESP) between a server in the corporate office and a client computer in the remote office. In which situation can the packet content be inspected?)

Options:

A.

On devices at headquarters and offsite before being sent and after being received

B.

In the headquarters’ and offsite location’s networks after the data has been sent

C.

Only in the offsite location’s network while data is in transit

D.

Only in the headquarters’ network while data is in transit

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.