100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C839 OBJECTIVE ASSESSMENT FINAL INTRODUCTION TO CRYPTOGRAPHY EXAM WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED ANSWERS |FREQUENTLY TESTED QUESTIONS AND SOLUTIONS |ALREADY GRADED A+|BRAND NEW!!!|GUARANTEED PASS |LATEST UPDATE $24.99   Add to cart

Exam (elaborations)

WGU C839 OBJECTIVE ASSESSMENT FINAL INTRODUCTION TO CRYPTOGRAPHY EXAM WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED ANSWERS |FREQUENTLY TESTED QUESTIONS AND SOLUTIONS |ALREADY GRADED A+|BRAND NEW!!!|GUARANTEED PASS |LATEST UPDATE

 7 views  0 purchase
  • Course
  • WGU C839
  • Institution
  • WGU C839

WGU C839 OBJECTIVE ASSESSMENT FINAL INTRODUCTION TO CRYPTOGRAPHY EXAM WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED ANSWERS |FREQUENTLY TESTED QUESTIONS AND SOLUTIONS |ALREADY GRADED A+|BRAND NEW!!!|GUARANTEED PASS |LATEST UPDATE

Preview 4 out of 75  pages

  • September 11, 2024
  • 75
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • wgu c839 objective
  • wgu c839
  • WGU C839
  • WGU C839
avatar-seller
chokozilowreh
WGU C839 OBJECTIVE ASSESSMENT FINAL
INTRODUCTION TO CRYPTOGRAPHY EXAM
2024-2025 WITH ACTUAL CORRECT
QUESTIONS AND VERIFIED DETAILED
ANSWERS |FREQUENTLY TESTED
QUESTIONS AND SOLUTIONS |ALREADY
GRADED A+|BRAND NEW!!!|GUARANTEED
PASS |LATEST UPDATE



What is Kerchoff's principle?

A A minimum key size of 256 bits is necessary for security.
B Both algorithm and key should be kept secret.
C A minimum of 15 rounds is needed for a Feistel cipher to be secure.
D Only the key needs to be secret, not the actual algorithm.

D

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be
publically disclosed without damaging security?

A Babbage's principle
B Kerkchoff's principle
C Vigenere's principle
D Shamir's principle

B

A process that puts a message into the least significant bits of a binary file is called what?

A Symmetric cryptography
B Masking
C Steganography
D Asymmetric cryptography

C

1|Page

,If you wished to see a list of revoked certificates from a CA, where would you look?

A CRL
B CA
C RFC
D RA

A

Which of the following is generally true about block ciphers?

A Secret block ciphers should be trusted.
B Block ciphers permute the bits of the input plaintext.
C The plaintext and ciphertext are always the same size.
D A block cipher is an encryption function for variable-size blocks of data.

C

What does the OCSP protocol provide?

A encryption
B VPN connectivity
C hashing
D a real time protocol for verifying certificates

D

U.S. encryption standard that replaced DES. Block symmetric cipher that uses 128-bit block sizes and
various key lengths (128, 192, 256).

AES

DES, 3DES, SHA, AES (some AES implementations are Type I)

Class 3 Algorithms

Encryption method where the sender and receiver use an instance of the same key for encryption and
decryption purposes.

Symmetric

Block symmetric algorithm chosen by NIST as an encryption standard in 1976. It uses a 56-bit true key
bit size, 64-bit block size, and 16 rounds of computation.

Data Encryption Standard (DES)

technical specification indicating how multimedia data and e-mail binary attachments are to be
transferred.

Multipurpose Internet Mail Extensions (MIME)



2|Page

,Valid data transmission is maliciously or fraudulently repeated to allow an entity gain unauthorized
access.

Replay Attack

protocol suite that provides a method of setting up a secure channel for protected data exchange
between two devices.

Internet Protocol Security (IPSec)

Juniper (block cipher)
MAYFLY (asymmetric)
FASTHASH (hashing)
WALBURN (high bandwith link encryption)
PEGASUS (satellite telemetry)

Class 1 Algorithms

Component of a PKI that creates and maintains digital certificates throughout their life cycles.

Certificate Authority

Uses public key encryption and provides data encryption, server authentication, message integrity, and
optional client authentication.
It is currently at version 3.0.

Secure Sockets Layer (SSL)

Manipulating individuals so that they will divulge confidential information, rather than by breaking in or
using technical cracking techniques.

Social engineering attack

Cryptanalysis attack where the attacker is assumed to have access only to a set of ciphertexts.

Ciphertext-only attack

servers and software signing, for which independent verification and checking of identity and authority
is done by issuing CA

Class 3 Certificates

it should be impossible for any attacker to calculate, or otherwise guess, from any given subsequence,
any previous or future values in the sequence

BSI Criteria K3 states

Cryptanalysis attack that uses identified statistical patterns.

Statistical attack

organizations for which proof of identity is required

Class 2 Certificates

3|Page

, Block symmetric cipher that uses a 128-bit key and 64-bit block size.

International Data Encryption Algorithm (IDEA)

individuals, and intended for email

Class 1 Certificates

A form of cryptanalysis applicable to symmetric key algorithms that was invented by Eli Biham and Adi
Shamir.

The examination of differences in an input and how that affects the resultant difference in the output.

Differential cryptanalysis

Cryptanalysis attack where the attacker is assumed to have access to sets of corresponding plaintext and
ciphertext.

Known plaintext attack

Carries out real-time validation of a certificate and reports back to the user whether the certificate is
valid, invalid, or unknown.
______________ checks the CRL that is maintained by the CA.

Online Certificate Status Protocol (OCSP)

What is the formula Me%n related to?

Encrypting with RSA

Plain-text is equal to the encryption function (E) with the key (k) and the ciphertext (c) being passed as
parameters to that function

P= E(k,c) Symmetric decryption

Not certified for government use

Class 4 algorithms

64 bit algorithm operating at 56 bits with an 8 bit parity block

DES

___ is the authenticating protocol, and _____ is an authenticating and encrypting protocol that uses
cryptographic mechanisms to provide source authentication, confidentiality, and message integrity.

Authentication Header (AH) and Encapsulating Security Payload (ESP).

developed as a Russian national standard and produced fixed length outputs of 256 bits

GOST

A measure of the uncertainty associated with a random variable

Entropy

4|Page

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller chokozilowreh. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $24.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$24.99
  • (0)
  Add to cart