Month End Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Introduction-to-Cryptography - WGU Introduction to Cryptography HNO1

Page: 1 / 2
Total 60 questions

(What is the value of 51 mod 11?)

A.

04

B.

05

C.

07

D.

11

(What is the maximum key size (in bits) supported by AES?)

A.

128

B.

192

C.

256

D.

512

(What is the length of the Initialization Vector (IV) in WEP?)

A.

24 bits

B.

40 bits

C.

48 bits

D.

56 bits

(What is an alternative to using a Certificate Revocation List (CRL) with certificates?)

A.

Privacy Enhanced Mail (PEM)

B.

Online Certificate Status Protocol (OCSP)

C.

Root Certificate Authority (CA)

D.

Policy Certificate Authority (CA)

(What is the value of 23 mod 6?)

A.

03

B.

04

C.

05

D.

06

(What is an attribute of RC4 when used with WEP?)

A.

40-bit key

B.

128-bit key

C.

256-bit key

D.

512-bit key

(A company wants to use certificates issued by a root CA to demonstrate to customers that it is a legitimate company being hosted by a cloud provider. Who needs to trust the root CA public key?)

A.

The seller and the buyer

B.

The cloud provider and the seller

C.

The Federal Trade Commission and the cloud provider

D.

The buyer and the Federal Trade Commission

(An administrator has configured a Virtual Private Network (VPN) connection utilizing IPsec transport mode with Encapsulating Security Payload (ESP) between a server in the corporate office and a client computer in the remote office. In which situation can the packet content be inspected?)

A.

On devices at headquarters and offsite before being sent and after being received

B.

In the headquarters’ and offsite location’s networks after the data has been sent

C.

Only in the offsite location’s network while data is in transit

D.

Only in the headquarters’ network while data is in transit

(Which encryption algorithm encrypts with one key, decrypts with another key, and then encrypts with the first key?)

A.

IDEA

B.

AES

C.

3DES

D.

DES

(Why should an administrator choose lightweight cryptography?)

A.

The desktop is in a secure area of the building.

B.

The embedded system has limited resources.

C.

The payload requires complex rounds of encryption.

D.

The data requires minimal protection due to the sensitivity level.