Package deal
WGU C839 TESTS COMPILATION BUNDLE
WGU C839 TESTS COMPILATION BUNDLE
[Show more]WGU C839 TESTS COMPILATION BUNDLE
[Show more]1. How did the ATBASH cipher work? CORRECT ANSWERS: By substituting each letter for the letter from the opposite end of the alphabet (i.e. Abecomes Z, B becomes Y, etc.) 
 
2. DES has a key space of what? CORRECT ANSWERS: 2^56 
 
3. Which of the following are valid key sizes for AES (choose three)...
Preview 2 out of 6 pages
Add to cart1. How did the ATBASH cipher work? CORRECT ANSWERS: By substituting each letter for the letter from the opposite end of the alphabet (i.e. Abecomes Z, B becomes Y, etc.) 
 
2. DES has a key space of what? CORRECT ANSWERS: 2^56 
 
3. Which of the following are valid key sizes for AES (choose three)...
PKCS #1 CORRECT ANSWERS: RSA Cryptography Standard 
 
PKCS #3 CORRECT ANSWERS: Diffie-Hellman Key Agreement Standard 
 
PKCS #5/RFC 2898 CORRECT ANSWERS: Password-based Encryption Standard 
 
PKCS #8 CORRECT ANSWERS: Private-Key Information Syntax Standard 
 
PKCS #13 CORRECT ANSWERS: Elliptic ...
Preview 2 out of 7 pages
Add to cartPKCS #1 CORRECT ANSWERS: RSA Cryptography Standard 
 
PKCS #3 CORRECT ANSWERS: Diffie-Hellman Key Agreement Standard 
 
PKCS #5/RFC 2898 CORRECT ANSWERS: Password-based Encryption Standard 
 
PKCS #8 CORRECT ANSWERS: Private-Key Information Syntax Standard 
 
PKCS #13 CORRECT ANSWERS: Elliptic ...
What advantage do symmetric algorithms have over asymmetric algorithms CORRECT ANSWERS: Symmetric algorithms are faster than Asymmetric algorithms 
 
Which of the following is generally true about key sizes? CORRECT ANSWERS: Larger key sizes increase security 
 
A ____ is a function is not reversi...
Preview 1 out of 1 pages
Add to cartWhat advantage do symmetric algorithms have over asymmetric algorithms CORRECT ANSWERS: Symmetric algorithms are faster than Asymmetric algorithms 
 
Which of the following is generally true about key sizes? CORRECT ANSWERS: Larger key sizes increase security 
 
A ____ is a function is not reversi...
Which encryption standard is approved by the National Security Agency (NSA) for classified information? CORRECT ANSWERS: Advanced Encryption Standard (AES 
 
Which National Security Agency (NSA) encryption algorithms are unevaluated commercial cryptographic components? CORRECT ANSWERS: Type 4 
 
W...
Preview 2 out of 5 pages
Add to cartWhich encryption standard is approved by the National Security Agency (NSA) for classified information? CORRECT ANSWERS: Advanced Encryption Standard (AES 
 
Which National Security Agency (NSA) encryption algorithms are unevaluated commercial cryptographic components? CORRECT ANSWERS: Type 4 
 
W...
Which encryption standard uses the same key to encrypt and decrypt messages? 
 
A) Asymmetric Key Encryption 
B) Symmetric Key Encryption 
C) Public Certificate 
D) CRL CORRECT ANSWERS: B 
 
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? 
 
A) DES 
B) AES 
...
Preview 4 out of 108 pages
Add to cartWhich encryption standard uses the same key to encrypt and decrypt messages? 
 
A) Asymmetric Key Encryption 
B) Symmetric Key Encryption 
C) Public Certificate 
D) CRL CORRECT ANSWERS: B 
 
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? 
 
A) DES 
B) AES 
...
Which encryption standard uses the same key to encrypt and decrypt messages CORRECT ANSWERS: Symmetric 
 
Which algorithm is designated as a Type 2 produce by the National Security Agency (NSA)? CORRECT ANSWERS: SkipJack 
 
Wha is the most commonly used format for certificates? CORRECT ANSWERS: x...
Preview 2 out of 5 pages
Add to cartWhich encryption standard uses the same key to encrypt and decrypt messages CORRECT ANSWERS: Symmetric 
 
Which algorithm is designated as a Type 2 produce by the National Security Agency (NSA)? CORRECT ANSWERS: SkipJack 
 
Wha is the most commonly used format for certificates? CORRECT ANSWERS: x...
Cryptography CORRECT ANSWERS: derived form the word kryptos which means "hidden," and the verb grafo, which means "Write", is the study of message secrecy 
 
Mono-Alphabet Substitution Algorithms CORRECT ANSWERS: These types of algorithms simply substitute one character of cipher text for each...
Preview 2 out of 6 pages
Add to cartCryptography CORRECT ANSWERS: derived form the word kryptos which means "hidden," and the verb grafo, which means "Write", is the study of message secrecy 
 
Mono-Alphabet Substitution Algorithms CORRECT ANSWERS: These types of algorithms simply substitute one character of cipher text for each...
Which encryption standard uses the same key to encrypt and decrypt messages? 
 
A) Asymmetric Key Encryption 
B) Symmetric Key Encryption 
C) Public Certificate 
D) CRL CORRECT ANSWERS: Symmetric Key Encryption 
 
Which algorithm is designated as a Type 2 product by the National Security Agency (NS...
Preview 2 out of 8 pages
Add to cartWhich encryption standard uses the same key to encrypt and decrypt messages? 
 
A) Asymmetric Key Encryption 
B) Symmetric Key Encryption 
C) Public Certificate 
D) CRL CORRECT ANSWERS: Symmetric Key Encryption 
 
Which algorithm is designated as a Type 2 product by the National Security Agency (NS...
Twofish CORRECT ANSWERS: 128 bits and key sizes of 128, 192, or 256 bits. It is a Feistel cipher. 
 
IDEA CORRECT ANSWERS: Operates on 64 bit blocks and has a 128 bit key. Consists of 8 identical transformations each round and an output transformation. 
 
CAST-128 CORRECT ANSWERS: Operates on 64 ...
Preview 1 out of 2 pages
Add to cartTwofish CORRECT ANSWERS: 128 bits and key sizes of 128, 192, or 256 bits. It is a Feistel cipher. 
 
IDEA CORRECT ANSWERS: Operates on 64 bit blocks and has a 128 bit key. Consists of 8 identical transformations each round and an output transformation. 
 
CAST-128 CORRECT ANSWERS: Operates on 64 ...
AES is ___ 
a. Asymmetric 
b. Symmetric CORRECT ANSWERS: B 
 
Serpent is ___ 
a. Asymmetric 
b. Symmetric CORRECT ANSWERS: B 
 
Two Fish is ___ 
a. Asymmetric 
b. Symmetric CORRECT ANSWERS: B 
 
RC5 & RC6 is ___ 
a. Asymmetric 
b. Symmetric CORRECT ANSWERS: B 
 
IDEA is ___ 
a. Asymmetric 
b. Sy...
Preview 3 out of 26 pages
Add to cartAES is ___ 
a. Asymmetric 
b. Symmetric CORRECT ANSWERS: B 
 
Serpent is ___ 
a. Asymmetric 
b. Symmetric CORRECT ANSWERS: B 
 
Two Fish is ___ 
a. Asymmetric 
b. Symmetric CORRECT ANSWERS: B 
 
RC5 & RC6 is ___ 
a. Asymmetric 
b. Symmetric CORRECT ANSWERS: B 
 
IDEA is ___ 
a. Asymmetric 
b. Sy...
Consists of public and private keys 
The public key is made public by publishing to a directory or installed on a computer. 
The private key is kept secret 
Does not involve exchanging a secret key or key exchange 
The public key is used to encrypt messages only the recipients private key can decryp...
Preview 1 out of 4 pages
Add to cartConsists of public and private keys 
The public key is made public by publishing to a directory or installed on a computer. 
The private key is kept secret 
Does not involve exchanging a secret key or key exchange 
The public key is used to encrypt messages only the recipients private key can decryp...
DES (block/key/rounds) CORRECT ANSWERS: BLOCK SIZE - 64bit 
KEY SIZE - 56bit 
ROUNDS - 16 
 
AES (block/key/rounds) CORRECT ANSWERS: BLOCK SIZE - 128bit 
KEY SIZE - 128, 192, or 256 
ROUNDS - 10,12, or 14 
 
Blowfish (block/key/rounds) CORRECT ANSWERS: BLOCK SIZE - 64bit 
KEY SIZE - 32-448 bit 
R...
Preview 1 out of 4 pages
Add to cartDES (block/key/rounds) CORRECT ANSWERS: BLOCK SIZE - 64bit 
KEY SIZE - 56bit 
ROUNDS - 16 
 
AES (block/key/rounds) CORRECT ANSWERS: BLOCK SIZE - 128bit 
KEY SIZE - 128, 192, or 256 
ROUNDS - 10,12, or 14 
 
Blowfish (block/key/rounds) CORRECT ANSWERS: BLOCK SIZE - 64bit 
KEY SIZE - 32-448 bit 
R...
What term from the list below best describes a data concealment for covert communication that makes use of LSB replacement? 
 
-Crypanalysis 
-Stegnalysis 
-Steganography 
-Whitening CORRECT ANSWERS: Steganography 
 
Which block cipher below uses a block size of 128 bits and key sizes up to 256 bit...
Preview 2 out of 14 pages
Add to cartWhat term from the list below best describes a data concealment for covert communication that makes use of LSB replacement? 
 
-Crypanalysis 
-Stegnalysis 
-Steganography 
-Whitening CORRECT ANSWERS: Steganography 
 
Which block cipher below uses a block size of 128 bits and key sizes up to 256 bit...
The same key is used to encrypt messages as well as decrypt messages. These algorithms are always faster but have an issue with exchanging keys. CORRECT ANSWERS: Symmetric Cryptography 
 
Modern cryptography began when Claude Shannon publish "Communication Theory of Secrecy Systems" in 1949. He f...
Preview 2 out of 8 pages
Add to cartThe same key is used to encrypt messages as well as decrypt messages. These algorithms are always faster but have an issue with exchanging keys. CORRECT ANSWERS: Symmetric Cryptography 
 
Modern cryptography began when Claude Shannon publish "Communication Theory of Secrecy Systems" in 1949. He f...
Most primitive of cryptographic algorithms, substitutes one character of cipher text for each character of plain text. Includes 
Caesar Cipher 
Atbash Cipher 
Affine Cipher 
Rot13 Cipher CORRECT ANSWERS: Mono-Alphabet Substitution 
 
First used by Julius Caesar 
Every letter is shifted a fixed num...
Preview 1 out of 3 pages
Add to cartMost primitive of cryptographic algorithms, substitutes one character of cipher text for each character of plain text. Includes 
Caesar Cipher 
Atbash Cipher 
Affine Cipher 
Rot13 Cipher CORRECT ANSWERS: Mono-Alphabet Substitution 
 
First used by Julius Caesar 
Every letter is shifted a fixed num...
Which block cipher modes can be used to turn a block cipher into a stream cipher? Select two. CORRECT ANSWERS: Counter Mode CTR 
and Output Feedback Mode OFB 
 
What are reasons certificates should have an expiration date? Select all that apply CORRECT ANSWERS: 1 Decreases risk of compromise 
2 T...
Preview 1 out of 2 pages
Add to cartWhich block cipher modes can be used to turn a block cipher into a stream cipher? Select two. CORRECT ANSWERS: Counter Mode CTR 
and Output Feedback Mode OFB 
 
What are reasons certificates should have an expiration date? Select all that apply CORRECT ANSWERS: 1 Decreases risk of compromise 
2 T...
What type of encryption uses different keys to encrypt and decrypt the message? 
 
A Symmetric 
B Private key 
C Secure 
D Asymmetric CORRECT ANSWERS: D 
 
The most widely used asymmetric encryption algorithm is what? 
 
A RSA 
B Vigenere 
C DES 
D Caesar Cipher CORRECT ANSWERS: A 
 
Original, une...
Preview 4 out of 33 pages
Add to cartWhat type of encryption uses different keys to encrypt and decrypt the message? 
 
A Symmetric 
B Private key 
C Secure 
D Asymmetric CORRECT ANSWERS: D 
 
The most widely used asymmetric encryption algorithm is what? 
 
A RSA 
B Vigenere 
C DES 
D Caesar Cipher CORRECT ANSWERS: A 
 
Original, une...
Cryptography CORRECT ANSWERS: science of altering communication so that it cannot be understood without having the key 
 
Mono-Alphabet Substitution CORRECT ANSWERS: algorithms simply substitute one character of cipher text for each character of plain text. 
 
Caesar Cipher CORRECT ANSWERS: choos...
Preview 2 out of 14 pages
Add to cartCryptography CORRECT ANSWERS: science of altering communication so that it cannot be understood without having the key 
 
Mono-Alphabet Substitution CORRECT ANSWERS: algorithms simply substitute one character of cipher text for each character of plain text. 
 
Caesar Cipher CORRECT ANSWERS: choos...
CrypTool CORRECT ANSWERS: Software which allows encryption of text using historic algorithms 
 
The Enigma Machine CORRECT ANSWERS: In World War II the Germans made use of an electro-mechanical rotor based cipher Known as The Enigma Machine. 
 
Allied cipher machines used in WWII included the Brit...
Preview 3 out of 19 pages
Add to cartCrypTool CORRECT ANSWERS: Software which allows encryption of text using historic algorithms 
 
The Enigma Machine CORRECT ANSWERS: In World War II the Germans made use of an electro-mechanical rotor based cipher Known as The Enigma Machine. 
 
Allied cipher machines used in WWII included the Brit...
Which encryption standard uses the same key to encrypt and decrypt messages? CORRECT ANSWERS: Symmetric Key Encryption 
 
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? CORRECT ANSWERS: SKIPJACK 
 
What is the most commonly used format for certificates? C...
Preview 2 out of 6 pages
Add to cartWhich encryption standard uses the same key to encrypt and decrypt messages? CORRECT ANSWERS: Symmetric Key Encryption 
 
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? CORRECT ANSWERS: SKIPJACK 
 
What is the most commonly used format for certificates? C...
Cryptography CORRECT ANSWERS: The science of altering communication so that it cannot be understood without having the key. 
 
cipher CORRECT ANSWERS: The algorithm(s) needed to encrypt and decrypt a message. 
 
Mono-alphabet substitution CORRECT ANSWERS: Substitute one character of cipher text f...
Preview 3 out of 19 pages
Add to cartCryptography CORRECT ANSWERS: The science of altering communication so that it cannot be understood without having the key. 
 
cipher CORRECT ANSWERS: The algorithm(s) needed to encrypt and decrypt a message. 
 
Mono-alphabet substitution CORRECT ANSWERS: Substitute one character of cipher text f...
1x sold
Symmetric CORRECT ANSWERS: Which encryption standard uses the same key to encrypt and decrypt messages? 
 
Skipjack CORRECT ANSWERS: Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? 
 
X.509 v3 CORRECT ANSWERS: What is the most commonly used format for cert...
Preview 2 out of 10 pages
Add to cartSymmetric CORRECT ANSWERS: Which encryption standard uses the same key to encrypt and decrypt messages? 
 
Skipjack CORRECT ANSWERS: Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)? 
 
X.509 v3 CORRECT ANSWERS: What is the most commonly used format for cert...
Cryptography (or cryptology); CORRECT ANSWERS: derived from word kryptós which means "hidden," and the verb gráfo, which means "write." It is the study of message secrecy. The process or skill of communicating in or deciphering secret writings or ciphers 
 
Cesar Cipher CORRECT ANSWERS: (m...
Preview 3 out of 17 pages
Add to cartCryptography (or cryptology); CORRECT ANSWERS: derived from word kryptós which means "hidden," and the verb gráfo, which means "write." It is the study of message secrecy. The process or skill of communicating in or deciphering secret writings or ciphers 
 
Cesar Cipher CORRECT ANSWERS: (m...
Cryptography CORRECT ANSWERS: The process or skill of communicating in or deciphering secret writings 
 
What is a key component of any secure communications. CORRECT ANSWERS: Cryptography 
 
A way to encode a message that would be readable by intended recipients. CORRECT ANSWERS: Cryptography 
 ...
Preview 3 out of 23 pages
Add to cartCryptography CORRECT ANSWERS: The process or skill of communicating in or deciphering secret writings 
 
What is a key component of any secure communications. CORRECT ANSWERS: Cryptography 
 
A way to encode a message that would be readable by intended recipients. CORRECT ANSWERS: Cryptography 
 ...
1. A business wants to use keys issued by a trusted third party to demonstrate to potential customers that it is a legitimate organization. 
Which key is used to sign the certificate issued to the business? 
 
Private key of the root CA 
Public key of the root CA 
Private key of the company 
Public...
Preview 2 out of 12 pages
Add to cart1. A business wants to use keys issued by a trusted third party to demonstrate to potential customers that it is a legitimate organization. 
Which key is used to sign the certificate issued to the business? 
 
Private key of the root CA 
Public key of the root CA 
Private key of the company 
Public...
- Cipher 
- Key 
- Algorithm CORRECT ANSWERS: - The algorithm(s) needed to encrypt and decrypt a message. 
- The random bits used in encrypting a message. 
- The mathematical process used to alter a message and read it unintelligible by any but the intended party 
 
Stream Cipher CORRECT ANSWERS:...
Preview 3 out of 25 pages
Add to cart- Cipher 
- Key 
- Algorithm CORRECT ANSWERS: - The algorithm(s) needed to encrypt and decrypt a message. 
- The random bits used in encrypting a message. 
- The mathematical process used to alter a message and read it unintelligible by any but the intended party 
 
Stream Cipher CORRECT ANSWERS:...
These are usually the encryption of a message digest with the senders private key. 
In order to verify them, the recipient uses the senders public key. 
They are considered good if they provide the following. 
Authentication 
Integrity 
Non-repudiation CORRECT ANSWERS: Digital Signature 
 
It i...
Preview 2 out of 8 pages
Add to cartThese are usually the encryption of a message digest with the senders private key. 
In order to verify them, the recipient uses the senders public key. 
They are considered good if they provide the following. 
Authentication 
Integrity 
Non-repudiation CORRECT ANSWERS: Digital Signature 
 
It i...
1x sold
DES CORRECT ANSWERS: 64 Bit Block - 56 Bit Key - 16 Rounds 
 
AES CORRECT ANSWERS: 128 Bit Block - 128, 192, 256 Bit Key - 10, 12, 14 Rounds 
 
BlowFish CORRECT ANSWERS: 64 Bit Block - 32 thru 448 Bit Key - 16 Rounds 
 
TwoFish CORRECT ANSWERS: 128 Bit Block - 1 thru 256 Bit Key - 16 Rounds 
 
S...
Preview 2 out of 5 pages
Add to cartDES CORRECT ANSWERS: 64 Bit Block - 56 Bit Key - 16 Rounds 
 
AES CORRECT ANSWERS: 128 Bit Block - 128, 192, 256 Bit Key - 10, 12, 14 Rounds 
 
BlowFish CORRECT ANSWERS: 64 Bit Block - 32 thru 448 Bit Key - 16 Rounds 
 
TwoFish CORRECT ANSWERS: 128 Bit Block - 1 thru 256 Bit Key - 16 Rounds 
 
S...
Serpent CORRECT ANSWERS: Symmetric Block Cipher 
Block Size: 128 bits 
Key Size: 128, 192, or 256 bits 
Rounds: 32 
Network: Substitution-Permutation 
 
Tiny Encryption Algorithm (TEA) CORRECT ANSWERS: Symmetric Block Cipher 
Block Size: 64 bits 
Key Size: 128 bits 
 
Cryptography CORRECT ANSWER...
Preview 3 out of 19 pages
Add to cartSerpent CORRECT ANSWERS: Symmetric Block Cipher 
Block Size: 128 bits 
Key Size: 128, 192, or 256 bits 
Rounds: 32 
Network: Substitution-Permutation 
 
Tiny Encryption Algorithm (TEA) CORRECT ANSWERS: Symmetric Block Cipher 
Block Size: 64 bits 
Key Size: 128 bits 
 
Cryptography CORRECT ANSWER...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
No, you only buy these notes for $40.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
80202 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now