Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the WGU Courses and Certificates Introduction-to-Cryptography Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

(What is the Enigma machine known for in the history of cryptography?)

Options:

A.

A type of cryptographic algorithm


B.

A device used for secure communication during World War II


C.

A method for decrypting messages


D.

A software program for encrypting emails


Expert Solution
Questions # 2:

(A security engineer is implementing device authentication as a form of two-factor authentication in a Public Key Infrastructure (PKI) environment. What should be used as a second form of authentication?)

Options:

A.

Symmetric encryption


B.

Digital certificate


C.

Asymmetric encryption


D.

Digital signature


Expert Solution
Questions # 3:

(A security analyst uses a polyalphabetic substitution cipher with a keyword of YELLOW to encrypt a message. Which cipher should be used to encrypt the message?)

Options:

A.

Pigpen


B.

Caesar


C.

Vigenère


D.

Playfair


Expert Solution
Questions # 4:

(Which type of encryption is Advanced Encryption Standard (AES) considered to be?)

Options:

A.

Hybrid encryption


B.

Quantum encryption


C.

Asymmetric encryption


D.

Symmetric encryption


Expert Solution
Questions # 5:

(How does a cryptographic policy contribute to incident response?)

Options:

A.

By providing guidelines for secure data recovery and communication


B.

By limiting the use of encryption tools during incidents


C.

By slowing down the incident resolution process


D.

By increasing the likelihood of data breaches


Expert Solution
Questions # 6:

(What makes the RC4 cipher unique compared to RC5 and RC6?)

Options:

A.

Stream


B.

Asymmetric


C.

Symmetric


D.

Block


Expert Solution
Questions # 7:

(What is an attribute of RC4 when used with WEP?)

Options:

A.

40-bit key


B.

128-bit key


C.

256-bit key


D.

512-bit key


Expert Solution
Questions # 8:

(What is the relationship between Secure Sockets Layer (SSL) and Transport Layer Security (TLS)?)

Options:

A.

SSL is the replacement of TLS.


B.

SSL and TLS are identical in function and security.


C.

SSL is only used in email encryption.


D.

TLS replaced SSL to provide improved security.


Expert Solution
Questions # 9:

(What are the primary characteristics of Bitcoin proof of work?)

Options:

A.

Difficult to produce and difficult to verify


B.

Difficult to produce and easy to verify


C.

Easy to produce and easy to verify


D.

Easy to produce and difficult to verify


Expert Solution
Questions # 10:

(What is a characteristic of a hash function?)

Options:

A.

Data encryption


B.

Public-private key pair use


C.

One-way


D.

Reversible


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions