Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the WGU Courses and Certificates Introduction-to-Cryptography Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

(How can auditing enhance an organization ' s cryptographic practices?)

Options:

A.

It identifies weaknesses in current practices.


B.

It guarantees that no security incidents will occur.


C.

It eliminates the need for regular policy updates.


D.

It ensures all employees are trained in cryptography.


Expert Solution
Questions # 12:

(How are limits managed for the number of bitcoins that can be created and stored in a blockchain?)

Options:

A.

Rewards for mining reduce over time


B.

The total number of participants has been set


C.

A maximum has been established per country


D.

Each person has a maximum number


Expert Solution
Questions # 13:

(Which is an example of asymmetric encryption?)

Options:

A.

Secure Hash Algorithm 256 (SHA-256)


B.

Hash-based Message Authentication Code (HMAC)


C.

Data Encryption Standard (DES)


D.

Elliptic-Curve Cryptography (ECC)


Expert Solution
Questions # 14:

(What is an example of a block cipher mode of operation?)

Options:

A.

Secure Hash Algorithm 256 (SHA-256)


B.

Digital Signature Algorithm (DSA)


C.

Rivest–Shamir–Adleman (RSA)


D.

Electronic Codebook (ECB)


Expert Solution
Questions # 15:

(Which technique involves spotting variations in encrypted data and plotting how the characters relate to standard English characters?)

Options:

A.

Brute force


B.

Frequency analysis


C.

Known plaintext


D.

Chosen ciphertext


Expert Solution
Questions # 16:

(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)

Options:

A.

Privacy Enhanced Mail (PEM)


B.

Online Certificate Status Protocol (OCSP)


C.

Root Certificate Authority (CA)


D.

Policy Certificate Authority (CA)


Expert Solution
Questions # 17:

(What are the roles of keys when using digital signatures?)

Options:

A.

A private key is used for both signing and signature validation.


B.

A private key is used for signing, and a public key is used for signature validation.


C.

A public key is used for both signing and signature validation.


D.

A public key is used for signing, and a private key is used for signature validation.


Expert Solution
Questions # 18:

(What is the primary purpose of the Health Insurance Portability and Accountability Act (HIPAA) in relation to encryption?)

Options:

A.

To standardize the use of encryption across all industries


B.

To prohibit the use of electronic health records


C.

To allow healthcare providers to encrypt patient records at their discretion


D.

To ensure the confidentiality of patient information through secure measures like encryption


Expert Solution
Questions # 19:

(Which mechanism implemented in WPA-Enterprise guards against bit-flipping exploits?)

Options:

A.

Advanced Encryption Standard (AES)


B.

Pre-shared key (PSK)


C.

Message Integrity Check (MIC)


D.

Global encryption key


Expert Solution
Questions # 20:

(Which attack maps hashed values to their original input data?)

Options:

A.

Dictionary


B.

Rainbow table


C.

Birthday


D.

Brute-force


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions