Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C839 OBJECTIVE ASSESSMENT 2 LATEST VERSIONS

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
19-12-2024
Written in
2024/2025

WGU C839 OBJECTIVE ASSESSMENT 2 LATEST VERSIONS

Institution
Course

Content preview

Which encryption standard uses the same key to
encrypt and decrypt messages? -
answersSymmetric
Which algorithm is designated as a Type 2 product
by the National Security Agency (NSA)? -
answersSkipjack
What is the most commonly used format for
certificates? - answersX.509 v3
What is referenced to determine if a certificate has
been revoked? - answersCertificate revocation list
(CRL)
What needs to be installed on end users' computers
to allow them to trust applications that have been
digitally signed by the developer? - answersSender's
public key

,Which type of certificate must be certified by an
authority to verify it with other participants? -
answersPublic Certificate
What is an attribute of the Rivest Cipher 4 (RC4)
algorithm? - answersIt requires a unique nonce.
Which mode generates the key stream with a nonce
and incrementing value? - answersCounter (CTR)
Which mode is a stream algorithm that concatenates
an incrementing value with a nonce? -
answersCounter (CTR)
Which key would an administrator use to encrypt
data so only the CEO can decrypt it? -
answersCEO's public key
What is the result of a hash function? -
answersDigest
What is used to efficiently encrypt large files? -
answersSymmetric encryption
An administrator needs to encrypt the following word
with the Atbash cipher: security What is the correct
ciphertext? - answershvxfirgb
Which cryptographic algorithm has a 128-bit hash
size? - answersMessage Digest Algorithm 5 (MD5)
Which characteristic makes a hashing function
suitable for use in signature schemes? -
answersCollision resistance
Which attribute of a hashing function makes a
birthday attack possible? - answersPartial-message
collision

, Which hash algorithm produces a 160-bit output
value? - answersSHA-1
What does cipher block chaining (CBC) use with the
key to encrypt subsequent blocks of plaintext? -
answersPrevious generated ciphertext
Which mode produces the same ciphertext from two
identical plaintext blocks? - answersElectronic
codebook (ECB)
Which encryption mode is least secure? -
answersElectronic codebook (ECB)
What is the mathematical formula used for
symmetric decryption? - answersP = E (K,C)
Which algorithm relies on factoring the product of
large prime numbers? - answersRivest-Shamir-
Adleman
Which encryption technology is a serial combination
of hashing, data compression, symmetric-key
cryptography, and public key infrastructure (PKI) and
can be used for encrypting texts, emails, files, and
directories or for full disk encryption? -
answersPretty Good Privacy (PGP)
Which concept stipulates that algorithms should be
openly shared and scrutinized, but keys must be
absolutely secured? - answersKerckhoffs's principle
Which encryption process minimizes known plaintext
attacks against Advanced Encryption Standard
(AES)? - answersRandomizing the initialization
vector

Written for

Course

Document information

Uploaded on
December 19, 2024
Number of pages
16
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$19.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
TUTORKEN

Get to know the seller

Seller avatar
TUTORKEN Walden University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 year
Number of followers
0
Documents
43
Last sold
-
TUTOR KEN

You will get solutions to all subjects in both assignments and major exams. Contact me for any assisstance. Good luck! Simple well-researched education material for you. Expertise in Nursing, Mathematics, Psychology, Biology etc,. My Work contains the latest, updated Exam Solutions, Study Guides, Notes 100% verified Guarantee .

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions