Month End Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Introduction-to-Cryptography - WGU Introduction to Cryptography HNO1

Page: 2 / 2
Total 60 questions

(Which default port must be allowed by firewalls for the key exchange of the IPsec handshaking process to be successful?)

A.

TCP 443

B.

UDP 443

C.

TCP 500

D.

UDP 500

(Which mechanism implemented in WPA-Enterprise guards against bit-flipping exploits?)

A.

Advanced Encryption Standard (AES)

B.

Pre-shared key (PSK)

C.

Message Integrity Check (MIC)

D.

Global encryption key

(What are the roles of keys when using digital signatures?)

A.

A private key is used for both signing and signature validation.

B.

A private key is used for signing, and a public key is used for signature validation.

C.

A public key is used for both signing and signature validation.

D.

A public key is used for signing, and a private key is used for signature validation.

(Which attack maps hashed values to their original input data?)

A.

Dictionary

B.

Rainbow table

C.

Birthday

D.

Brute-force

(A Linux user password is identified as follows:

$2a$08$AbCh0RCM8p8FGaYvRLI0H.Kng54gcnWCOQYIhas708UEZRQQjGBh4

Which hash algorithm should be used to salt this password?)

A.

NTLM

B.

SHA-512

C.

MD5

D.

bcrypt

(Which wireless security standard uses an authentication server with 802.1X and EAP?)

A.

WPA-PSK

B.

WEP

C.

WPA-Enterprise

D.

TKIP

(Which type of exploit involves looking for different inputs that generate the same hash?)

A.

Birthday attack

B.

Linear cryptanalysis

C.

Algebraic attack

D.

Differential cryptanalysis

(What describes a true random number generator?)

A.

Fast and deterministic, and the same input produces the same results

B.

Slow and nondeterministic, and the same input produces different results

C.

Unique integer determined through factorization of integers

D.

Integer increased by one to match requests and responses