Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU IT D334 PHNO – Introduction to Cryptography Pre-Assessment Practice Pack (2026)

Beoordeling
-
Verkocht
-
Pagina's
17
Cijfer
A+
Geüpload op
22-01-2026
Geschreven in
2025/2026

WGU IT D334 PHNO – Introduction to Cryptography Pre-Assessment Practice Pack (2026)

Instelling
IT D334 PHNO – Introduction To Cryptography
Vak
IT D334 PHNO – Introduction to Cryptography

Voorbeeld van de inhoud

IT D334 PHNO – Introduction to
Cryptography Pre -Assessment
Attempt #2
Status: Passed

1. A business wants to use keys issued by a trusted third party to demonstrate to potential customers that it is a
legitimate organization.

Which key is used to sign the certificate issued to the business?
YOUR CORRECT
ANSWER ANSWER


Private key of the root CA


Public key of the root CA


Private key of the company


Public key of the company


2. A business wants to use keys issued by a trusted third party to demonstrate it is a legitimate organization to
potential customers.

Which key should the business send to potential customers to prove its identity?
YOUR CORRECT
ANSWER ANSWER


Private key of the root CA


Public key of the root CA


Private key of the company


Public key of the company


3. What should an administrator use to import and export all items written using X.509 that are part of a chain
of trust?
YOUR CORRECT
ANSWER ANSWER


CER


Public Key Cryptography Standard (PKCS) #7


Public Key Cryptography Standard (PKCS) #12

1/17

, YOUR CORRECT
ANSWER ANSWER


RTF


4. Which field displays the hash, or digest, of the certificate in an X.509 certificate?
YOUR CORRECT
ANSWER ANSWER


Subject


Issuer


Version


Thumbprint



5. Which certificate management process involves key recovery?
YOUR CORRECT
ANSWER ANSWER


Initialization


Issued


Cancellation


Hold


6. Which task does a root CA perform before publishing its own certificate?
YOUR CORRECT
ANSWER ANSWER


Encrypting it with its private key


Encrypting it with its public key


Signing it with its private key


Signing it with its public key


7. Which algorithm is used to generate the thumbprint of a certificate?
YOUR CORRECT
ANSWER ANSWER


RSA


3DES



2/17

, YOUR CORRECT
ANSWER ANSWER


AES


SHA-1


8. Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely distributed.

Which approach should be used for encryption and distribution?
YOUR CORRECT
ANSWER ANSWER


Encrypt by using symmetric keys and distribute by using asymmetric keys


Encrypt by using asymmetric keys and distribute by using symmetric keys


Encrypt by using symmetric keys and distribute by using symmetric keys


Encrypt by using asymmetric keys and distribute by using asymmetric
keys


9. What is the role of a key in asymmetric encryption and decryption?
YOUR CORRECT
ANSWER ANSWER


A public key is used for both encryption and decryption.


A private key is used for both encryption and decryption.


A public key is used for encryption, and a private key is used for
decryption.


A private key is used for encryption, and a public key is used for
decryption.


10. A security analyst is validating the integrity and authenticity of a data transaction.

Which PKI component is being used?
YOUR CORRECT
ANSWER ANSWER


Digital certificate


Digital signature


Asymmetric encryption


Symmetric encryption


3/17

Geschreven voor

Instelling
IT D334 PHNO – Introduction to Cryptography
Vak
IT D334 PHNO – Introduction to Cryptography

Documentinformatie

Geüpload op
22 januari 2026
Aantal pagina's
17
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$20.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EXAMCOLLECTIVES Herzing University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1775
Lid sinds
4 jaar
Aantal volgers
1159
Documenten
23369
Laatst verkocht
4 dagen geleden
Ace Your Exams with Elite Study Resources | ExamEliteHub on Stuvia

I offer genuine and dependable exam papers that are directly obtained from well-known, reputable institutions as a highly regarded professional who specializes in sourcing study materials. These papers are invaluable resources made to help people who want to become nurses and people who work in other fields prepare for exams. Because of my extensive experience and in-depth knowledge of the subject, I take great care to ensure that each exam paper meets the highest quality, accuracy, and relevance standards, making them an essential component of any successful study plan.

Lees meer Lees minder
4.1

447 beoordelingen

5
252
4
57
3
84
2
19
1
35

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen