100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU 178 COMPTIA Security Focused on Chapter 8 Cryptography Exam Questions and Answers 2024/2025 $11.49   Add to cart

Exam (elaborations)

WGU 178 COMPTIA Security Focused on Chapter 8 Cryptography Exam Questions and Answers 2024/2025

 5 views  0 purchase
  • Course
  • WGU 178 CompTIA Security
  • Institution
  • WGU 178 CompTIA Security

WGU 178 COMPTIA Security Focused on Chapter 8 Cryptography Exam Questions and Answers 2024/2025 Transportation cipher can be done at the............level or at the byte (character) level. - correct answer bit Exclusive OR - correct answer a function of Boolean algebra; two bits are compared ...

[Show more]

Preview 2 out of 5  pages

  • August 29, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU 178 CompTIA Security
  • WGU 178 CompTIA Security
avatar-seller
KieranKent55
WGU 178 COMPTIA Security Focused on
Chapter 8 Cryptography Exam Questions and
Answers 2024/2025

Transportation cipher can be done at the............level or at the byte (character) level. -
correct answer bit


Exclusive OR - correct answer a function of Boolean algebra; two bits are compared


If two bits are identical, the result is binary ............. - correct answer 0


If two bits are not identical, result is binary ............. - correct answer 1


XOR ........................_ is a very simple symmetric cipher that is used in many
applications where security is NOT a defined requirement. - correct answer encryption


What company developed the Vernam Cipher - correct answer AT&T


Vernam Cipher - correct answer - uses set of characters once per encryption process


In ............___ cipher, each character of the plaintext is turned into a number, and a pad
value for that position is added. - correct answer Vernam


Book or Running Key Cipher - correct answer - uses text in book as key to decrypt a
message.


Ciphertext contains codes representing page, line,
and ............___ ..................................... - correct answer word numbers

, Algorithm is the mechanical process of : - correct answer - looking up references from
the ciphertext
- converting each reference to a word by using the cipher texts value and the key.


What are the typical sources in "Book or Running Key Cipher" ? - correct answer -
thesaurus
- dictionaries


Hash Functions: - correct answer - mathematical algorithms that generate message
summary/digest to confirm message identity and confirm no context has changed.
- use of keys not required


Hash Algorithms: - correct answer publicly known functions that create hash value.


Cryptographic Algorithms are often grouped into two broad categories: - correct
answer - symmetric and asymmetric.


Todays popular cryptosystems use a ............_ combo of symmetric and asymmetric
algorithms. - correct answer hybrid


Symmetric and asymmetric algorithms are distinguished by the types of ............_ they
use for encryption and decryption operations. - correct answer keys


Symmetric Encryption - correct answer uses same "secret key" to encipher and
decipher message.


In Symmetric Encryption, the encryption methods are extremely ........................___,
requiring minimal processing. - correct answer efficient


In symmetric encryption, both the sender and ........................___ must possess
encryption key. - correct answer receiver

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart